Heuristics and Rigor in Lattice-Based Cryptography (Invited Talk)

被引:0
|
作者
Peikert, Chris [1 ]
机构
[1] Georgia Inst Technol, Atlanta, GA 30332 USA
来源
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cryptographic schemes based on lattices first emerged in the mid-1990s, and have developed rapidly in the past few years. At the outset, works in this area fell into two very distinct types: Heuristic proposals such as NTRU, which lacked any formal security justification but were very practical; Schemes building on Ajtai's breakthrough work, which were highly impractical but came with provable 'worst-case' security guarantees. More recently, the line between efficiency and rigorous security has been blurred significantly (though not yet obliterated completely). This talk will survey several examples of early proposals that lacked any rigorous security analysis - and in some cases, turned out to be completely insecure - but which later inspired theoretically sound and efficient solutions. Even better, these solutions have opened the door to unexpected and far more advanced cryptographic applications than were originally envisioned.
引用
收藏
页码:54 / 54
页数:1
相关论文
共 50 条
  • [1] Lattice-based cryptography
    Regev, Oded
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 131 - 141
  • [2] Lattice-based Cryptography
    Mohsen, Ayman Wagih
    Bahaa-Eldin, Ayman M.
    Sobh, Mohamed Ali
    [J]. 2017 12TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), 2017, : 462 - 467
  • [3] Lattice-Based Cryptography: A Survey
    Wang, Xiaoyun
    Xu, Guangwu
    Yu, Yang
    [J]. CHINESE ANNALS OF MATHEMATICS SERIES B, 2023, 44 (06) : 945 - 960
  • [4] Lattice-Based Cryptography:A Survey
    Xiaoyun WANG
    Guangwu XU
    Yang YU
    [J]. Chinese Annals of Mathematics,Series B, 2023, (06) : 945 - 960
  • [5] Lattice-Based Cryptography: A Survey
    Xiaoyun Wang
    Guangwu Xu
    Yang Yu
    [J]. Chinese Annals of Mathematics, Series B, 2023, 44 : 945 - 960
  • [6] Symbolic Proofs for Lattice-Based Cryptography
    Barthe, Gilles
    Fan, Xiong
    Gancher, Joshua
    Gregoire, Benjamin
    Jacomme, Charlie
    Shi, Elaine
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 538 - 555
  • [7] Proof of a Shuffle for Lattice-Based Cryptography
    Costa, Nuria
    Martinez, Ramiro
    Morillo, Paz
    [J]. SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : 280 - 296
  • [8] Power Analysis Attacks for Lattice-Based Cryptography
    Li Y.-B.
    Zhu J.-J.
    Tang M.
    Zhang H.-G.
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (02): : 331 - 352
  • [9] Improved Plantard Arithmetic for Lattice-based Cryptography
    Huang J.
    Zhang J.
    Zhao H.
    Liu Z.
    Cheung R.C.C.
    Koç Ç.K.
    Chen D.
    [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04): : 614 - 636
  • [10] Some Recent Progress in Lattice-Based Cryptography
    Peikert, Chris
    [J]. THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 72 - 72