Approximate-Deterministic Public Key Encryption from Hard Learning Problems
暂无分享,去创建一个
Xianhui Lu | Bao Li | Yamin Liu | Fuyang Fang | Wenpan Jing | Bao Li | Yamin Liu | Xianhui Lu | Wenpan Jing | Fuyang Fang
[1] Dissertation Thesis,et al. A Coding-Theoretic Approach to Cryptanalysis , 2013 .
[2] Brent Waters,et al. Lossy trapdoor functions and their applications , 2008, SIAM J. Comput..
[3] Nico Döttling,et al. Lossy Codes and a New Variant of the Learning-With-Errors Problem , 2013, EUROCRYPT.
[4] Rui Zhang,et al. Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting , 2012, SCN.
[5] Ronald Cramer,et al. Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption , 2001, EUROCRYPT.
[6] Chris Peikert,et al. Public-key cryptosystems from the worst-case shortest vector problem: extended abstract , 2009, STOC '09.
[7] Xianhui Lu,et al. Cramer-Shoup Like Chosen Ciphertext Security from LPN , 2015, ISPEC.
[8] Daniele Micciancio,et al. Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions , 2011, CRYPTO.
[9] Gil Segev,et al. Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions , 2013, EUROCRYPT.
[10] Hoeteck Wee,et al. Dual Projective Hashing and Its Applications - Lossy Trapdoor Functions and More , 2012, EUROCRYPT.
[11] Brent Waters,et al. A Framework for Efficient and Composable Oblivious Transfer , 2008, CRYPTO.
[12] Yael Tauman Kalai,et al. Robustness of the Learning with Errors Assumption , 2010, ICS.
[13] Damien Stehlé,et al. Classical hardness of learning with errors , 2013, STOC '13.
[14] Abhishek Banerjee,et al. Pseudorandom Functions and Lattices , 2012, EUROCRYPT.
[15] Zvika Brakerski,et al. Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting , 2011, Journal of Cryptology.
[16] Brent Waters,et al. Identity-Based (Lossy) Trapdoor Functions and Applications , 2012, EUROCRYPT.
[17] Silas Richelson,et al. On the Hardness of Learning with Rounding over Small Modulus , 2016, TCC.
[18] I. Damgård,et al. How Practical is Public-Key Encryption Based on LPN and Ring-LPN ? , 2014 .
[19] Michael Alekhnovich. More on Average Case vs Approximation Complexity , 2011, computational complexity.
[20] Eike Kiltz,et al. Simple Chosen-Ciphertext Security from Low-Noise LPN , 2014, Public Key Cryptography.
[21] Chris Peikert,et al. Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller , 2012, IACR Cryptol. ePrint Arch..
[22] Adam O'Neill,et al. A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy , 2012, Journal of Cryptology.
[23] Serge Fehr,et al. On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles , 2008, CRYPTO.
[24] Mihir Bellare,et al. Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model , 2015, EUROCRYPT.
[25] Nico Döttling,et al. IND-CCA Secure Cryptography Based on a Variant of the LPN Problem , 2012, ASIACRYPT.
[26] Craig Gentry,et al. Trapdoors for hard lattices and new cryptographic constructions , 2008, IACR Cryptol. ePrint Arch..
[27] Mihir Bellare,et al. Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.
[28] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[29] Jiang Zhang,et al. Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN , 2016, CRYPTO.
[30] Adam O'Neill,et al. Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles , 2008, CRYPTO.
[31] Alon Rosen,et al. Candidate weak pseudorandom functions in AC0 ○ MOD2 , 2014, ITCS.
[32] Christof Paar,et al. Lapin: An Efficient Authentication Protocol Based on Ring-LPN , 2012, FSE.
[33] Stephan Krenn,et al. Learning with Rounding, Revisited: New Reduction, Properties and Applications , 2013, IACR Cryptol. ePrint Arch..
[34] Daniel Wichs,et al. Barriers in cryptography with weak, correlated and leaky sources , 2013, ITCS '13.
[35] Jonathan Katz,et al. Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices , 2009, ASIACRYPT.
[36] Mihir Bellare,et al. Instantiating Random Oracles via UCEs , 2013, IACR Cryptol. ePrint Arch..
[37] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.
[38] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.