Sciweavers

490 search results - page 13 / 98
» A New Public-Key Cryptosystem
Sort
View
158
Voted
STOC
2005
ACM
198views Algorithms» more  STOC 2005»
16 years 4 months ago
On lattices, learning with errors, random linear codes, and cryptography
Our main result is a reduction from worst-case lattice problems such as GAPSVP and SIVP to a certain learning problem. This learning problem is a natural extension of the `learnin...
Oded Regev
145
Voted
STOC
2003
ACM
116views Algorithms» more  STOC 2003»
15 years 9 months ago
New lattice based cryptographic constructions
We introduce the use of Fourier analysis on lattices as an integral part of a lattice based construction. The tools we develop provide an elegant description of certain Gaussian d...
Oded Regev
108
Voted
WCC
2005
Springer
172views Cryptology» more  WCC 2005»
15 years 9 months ago
Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems
Abstract. The Matsumoto-Imai (MI) cryptosystem was the first multivariate public key cryptosystem proposed for practical use. Though MI is now considered insecure due to Patarinā€...
Adama Diene, Jintai Ding, Jason E. Gower, Timothy ...
116
Voted
EUROCRYPT
1998
Springer
15 years 8 months ago
Auto-Recoverable Auto-Certifiable Cryptosystems
Abstract. This paper introduces a cryptographic paradigm called selfescrowed encryption, a concept initiated by kleptography. In simple words, a self-escrowed public-key cryptosyst...
Adam Young, Moti Yung
IMA
2001
Springer
117views Cryptology» more  IMA 2001»
15 years 8 months ago
An Identity Based Encryption Scheme Based on Quadratic Residues
We present a novel public key cryptosystem in which the public key of a subscriber can be chosen to be a publicly known value, such as his identity. We discuss the security of the ...
Clifford Cocks