Candidate Multilinear Maps Candidate Multilinear Maps
ACM Books

Candidate Multilinear Maps

    • ¥5,400
    • ¥5,400

発行者による作品情報

The aim of cryptography is to design primitives and protocols that withstand adversarial behavior. Information theoretic cryptography, how-so-ever desirable, is extremely restrictive and most non-trivial cryptographic tasks are known to be information theoretically impossible. In order to realize sophisticated cryptographic primitives, we forgo information theoretic security and assume limitations on what can be efficiently computed. In other words we attempt to build secure systems conditioned on some computational intractability assumption such as factoring, discrete log, decisional Diffie-Hellman, learning with errors, and many more.

In this work, based on the 2013 ACM Doctoral Dissertation Award-winning thesis, we put forth new plausible lattice-based constructions with properties that approximate the sought after multilinear maps. The multilinear analog of the decision Diffie-Hellman problem appears to be hard in our construction, and this allows for their use in cryptography. These constructions open doors to providing solutions to a number of important open problems.

ジャンル
コンピュータ/インターネット
発売日
2015年
3月1日
言語
EN
英語
ページ数
122
ページ
発行者
Association for Computing Machinery and Morgan & Claypool Publishers
販売元
Ingram DV LLC
サイズ
10.6
MB
Guide to Pairing-Based Cryptography Guide to Pairing-Based Cryptography
2017年
Integer Algorithms In Cryptology And Information Assurance Integer Algorithms In Cryptology And Information Assurance
2014年
Concise Encyclopedia of Coding Theory Concise Encyclopedia of Coding Theory
2021年
Designs from Linear Codes Designs from Linear Codes
2018年
Mathematics Almost Everywhere Mathematics Almost Everywhere
2018年
DESIGNS FR LINEAR CODES (2ND ED) DESIGNS FR LINEAR CODES (2ND ED)
2021年
A Framework for Scientific Discovery through Video Games A Framework for Scientific Discovery through Video Games
2014年
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
2014年
Embracing Interference in Wireless Systems Embracing Interference in Wireless Systems
2014年
Edmund Berkeley and the Social Responsibility of Computer Professionals Edmund Berkeley and the Social Responsibility of Computer Professionals
2015年
Verified Functional Programming in Agda Verified Functional Programming in Agda
2016年
Reactive Internet Programming Reactive Internet Programming
2016年