Concurrently secure identification schemes based on the worst-case hardness of lattice problems

170Citations
Citations of this article
66Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper, we show that two variants of Stern's identification scheme [IEEE Transaction on Information Theory '96] are provably secure against concurrent attack under the assumptions on the worst-case hardness of lattice problems. These assumptions are weaker than those for the previous lattice-based identification schemes of Micciancio and Vadhan [CRYPTO '03] and of Lyubashevsky [PKC '08].We also construct efficient ad hoc anonymous identification schemes based on the lattice problems by modifying the variants. © 2008 Springer Berlin Heidelberg.

Cite

CITATION STYLE

APA

Kawachi, A., Tanaka, K., & Xagawa, K. (2008). Concurrently secure identification schemes based on the worst-case hardness of lattice problems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5350 LNCS, pp. 372–389). https://doi.org/10.1007/978-3-540-89255-7_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free