Candidate Multilinear Maps Candidate Multilinear Maps
ACM Books

Candidate Multilinear Maps

    • $59.99
    • $59.99

Publisher Description

The aim of cryptography is to design primitives and protocols that withstand adversarial behavior. Information theoretic cryptography, how-so-ever desirable, is extremely restrictive and most non-trivial cryptographic tasks are known to be information theoretically impossible. In order to realize sophisticated cryptographic primitives, we forgo information theoretic security and assume limitations on what can be efficiently computed. In other words we attempt to build secure systems conditioned on some computational intractability assumption such as factoring, discrete log, decisional Diffie-Hellman, learning with errors, and many more.

In this work, based on the 2013 ACM Doctoral Dissertation Award-winning thesis, we put forth new plausible lattice-based constructions with properties that approximate the sought after multilinear maps. The multilinear analog of the decision Diffie-Hellman problem appears to be hard in our construction, and this allows for their use in cryptography. These constructions open doors to providing solutions to a number of important open problems.

GENRE
Computing & Internet
RELEASED
2015
1 March
LANGUAGE
EN
English
LENGTH
122
Pages
PUBLISHER
Association for Computing Machinery and Morgan & Claypool Publishers
SELLER
Ingram DV LLC
SIZE
10.6
MB
Guide to Pairing-Based Cryptography Guide to Pairing-Based Cryptography
2017
Multivariate Public Key Cryptosystems Multivariate Public Key Cryptosystems
2006
The LLL Algorithm The LLL Algorithm
2009
Open Problems in Mathematics and Computational Science Open Problems in Mathematics and Computational Science
2015
Cryptography in Constant Parallel Time Cryptography in Constant Parallel Time
2013
Stream Ciphers Stream Ciphers
2013
The VR Book The VR Book
2015
Communities of Computing Communities of Computing
2016
A Framework for Scientific Discovery through Video Games A Framework for Scientific Discovery through Video Games
2014
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
2014
Embracing Interference in Wireless Systems Embracing Interference in Wireless Systems
2014
Edmund Berkeley and the Social Responsibility of Computer Professionals Edmund Berkeley and the Social Responsibility of Computer Professionals
2015