Candidate Multilinear Maps Candidate Multilinear Maps
ACM Books

Candidate Multilinear Maps

    • $54.99
    • $54.99

Publisher Description

The aim of cryptography is to design primitives and protocols that withstand adversarial behavior. Information theoretic cryptography, how-so-ever desirable, is extremely restrictive and most non-trivial cryptographic tasks are known to be information theoretically impossible. In order to realize sophisticated cryptographic primitives, we forgo information theoretic security and assume limitations on what can be efficiently computed. In other words we attempt to build secure systems conditioned on some computational intractability assumption such as factoring, discrete log, decisional Diffie-Hellman, learning with errors, and many more.

In this work, based on the 2013 ACM Doctoral Dissertation Award-winning thesis, we put forth new plausible lattice-based constructions with properties that approximate the sought after multilinear maps. The multilinear analog of the decision Diffie-Hellman problem appears to be hard in our construction, and this allows for their use in cryptography. These constructions open doors to providing solutions to a number of important open problems.

GENRE
Computers & Internet
RELEASED
2015
March 1
LANGUAGE
EN
English
LENGTH
122
Pages
PUBLISHER
Association for Computing Machinery and Morgan & Claypool Publishers
SELLER
Ingram DV LLC
SIZE
10.6
MB

More Books Like This

Mathematical Methods in Computer Science Mathematical Methods in Computer Science
2008
Post-Quantum Cryptography Post-Quantum Cryptography
2021
Advances in Cryptology – ASIACRYPT 2020 Advances in Cryptology – ASIACRYPT 2020
2020
Pairing-Based Cryptography – Pairing 2008 Pairing-Based Cryptography – Pairing 2008
2008
Advances in Cryptology – EUROCRYPT 2022 Advances in Cryptology – EUROCRYPT 2022
2022
Arithmetic of Finite Fields Arithmetic of Finite Fields
2008

Other Books in This Series

The VR Book The VR Book
2015
Communities of Computing Communities of Computing
2016
A Framework for Scientific Discovery through Video Games A Framework for Scientific Discovery through Video Games
2014
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
2014
Embracing Interference in Wireless Systems Embracing Interference in Wireless Systems
2014
Edmund Berkeley and the Social Responsibility of Computer Professionals Edmund Berkeley and the Social Responsibility of Computer Professionals
2015