On the underlying hard lattice problems of GGH encryption scheme
Based on numerous experiments, the inventors of the Goldreich, Goldwasser and Halevi encryption scheme (GGH Scheme) conjectured that the Closest Vector Problem (CVP) instance which arose from the scheme was practically intractable in lattice with a dimension more than 300. However, some attacks had...
| Main Authors: | Mandangan, Arif, Kamarulhaili, Hailiza, Asbullah, Muhammad Asyraf |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
Institute for Mathematical Research, Universiti Putra Malaysia
2018
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/66528/ http://psasir.upm.edu.my/id/eprint/66528/1/Cryptology2018-3.pdf |
Similar Items
An upgrade on the key generation algorithm of the GGH-MKA lattice-based encryption scheme
by: Arif, Mandangan, et al.
Published: (2021)
by: Arif, Mandangan, et al.
Published: (2021)
On the smallest-basis problem underlying the GGH lattice-based cryptosystem
by: Mandangan, Arif, et al.
Published: (2019)
by: Mandangan, Arif, et al.
Published: (2019)
A security upgrade on the GGH lattice-based cryptosystem
by: Arif Mandangan,, et al.
Published: (2020)
by: Arif Mandangan,, et al.
Published: (2020)
The efficiency of embedding-based attacks on the GGH lattice-based cryptosystem
by: Mandangan,, A., et al.
Published: (2023)
by: Mandangan,, A., et al.
Published: (2023)
Square integer matrix with a single non-integer entry in its inverse
by: Mandangan, Arif, et al.
Published: (2021)
by: Mandangan, Arif, et al.
Published: (2021)
A new countermeasure to combat the embedding-based attacks on the Goldreich-Goldwasser-Halevi lattice-based cryptosystem
by: Mandangan, Arif, et al.
Published: (2024)
by: Mandangan, Arif, et al.
Published: (2024)
Identity-based encryption schemes - a review
by: Tea, Boon Chian, et al.
Published: (2019)
by: Tea, Boon Chian, et al.
Published: (2019)
Rabin-p encryption scheme analysis on MQTT
by: Che Izam, Wan Abdullah, et al.
Published: (2023)
by: Che Izam, Wan Abdullah, et al.
Published: (2023)
A new CCA-secure encryption based on the Gap Hashed Diffie-Hellman problem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2013)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2013)
Comparative analysis of three asymmetric encryption schemes based upon the intractability of square roots modulo N = p²q
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
Analysis of Rabin-p and HIME(R) encryption scheme on IoT platform
by: Abd Nashir, Abdul Muhaimin, et al.
Published: (2020)
by: Abd Nashir, Abdul Muhaimin, et al.
Published: (2020)
A proposed CCA-secure encryption on an ElGamal variant
by: Asbullah, Muhammad Asyraf, et al.
Published: (2012)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2012)
An identification scheme based on bivariate function hard problem
by: Tea, Boon Chian, et al.
Published: (2014)
by: Tea, Boon Chian, et al.
Published: (2014)
On the security defects of an image encryption scheme
by: C., Li, et al.
Published: (2009)
by: C., Li, et al.
Published: (2009)
An efficient identification scheme based on Bivariate function hard problem
by: Boon, Chian Tea, et al.
Published: (2022)
by: Boon, Chian Tea, et al.
Published: (2022)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
An efficient identification scheme in standard model based on the diophantine equation hard problem
by: Tea, Boon Chian, et al.
Published: (2013)
by: Tea, Boon Chian, et al.
Published: (2013)
Design And Cryptanalysis Of Encryption And Signature Schemes Without Certificates
by: Yap, Wun She
Published: (2007)
by: Yap, Wun She
Published: (2007)
On the sequences ri, si, ti ∈ ℤ related to extended Euclidean algorithm and continued fractions
by: Muhammad, Khairun Nisak, et al.
Published: (2016)
by: Muhammad, Khairun Nisak, et al.
Published: (2016)
Efficient identification scheme in standard model based on bivariate function hard problem
by: Tea, Boon Chian
Published: (2014)
by: Tea, Boon Chian
Published: (2014)
GR-FB block cleaning scheme in flash memory.
by: Abd.Rahiman, Amir Rizaan, et al.
Published: (2011)
by: Abd.Rahiman, Amir Rizaan, et al.
Published: (2011)
Extracapsular spread in oral squamous cell carcinoma and its association with GGH, CDKN3 and CBX7
by: Burhanudin, Nor Aszlitah, et al.
Published: (2018)
by: Burhanudin, Nor Aszlitah, et al.
Published: (2018)
Exploring self-invertible 3×3 matrices for cipher trigraphic polyfunction with distinct encryption keys
by: Yunos, Faridah, et al.
Published: (2024)
by: Yunos, Faridah, et al.
Published: (2024)
Security Analysis of a Public Key Cryptosystem for Synchronized Chaotic Systems
by: Mahad, Zahari, et al.
Published: (2022)
by: Mahad, Zahari, et al.
Published: (2022)
Encrypted quick response scheme for hotel check-in and access control system
by: Cheong, S., et al.
Published: (2017)
by: Cheong, S., et al.
Published: (2017)
Pairing-based public-key encryption schemes with backward-and-forward security
by: Han, Song, et al.
Published: (2008)
by: Han, Song, et al.
Published: (2008)
Many-body out-of-equilibrium dynamics of hard-core lattice bosons with non-local loss
by: Everest, Ben, et al.
Published: (2014)
by: Everest, Ben, et al.
Published: (2014)
New IV-Based database encryption scheme
using TS block cipher
by: Zailani Mohamad Sidek,, et al.
Published: (2004)
by: Zailani Mohamad Sidek,, et al.
Published: (2004)
Double random phase encryption scheme to multiplex and simultaneous encode multiple images
by: Alfalou, A., et al.
Published: (2009)
by: Alfalou, A., et al.
Published: (2009)
An updated cryptanalysis on the BFHP-DLP signing scheme
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2022)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2022)
Efficient implementation of lattice-based cryptographic
schemes for internet of things applications
by: Wong, Zheng Yan
Published: (2022)
by: Wong, Zheng Yan
Published: (2022)
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
by: Mandangan, Arif, et al.
Published: (2024)
by: Mandangan, Arif, et al.
Published: (2024)
Side channel analysis on AAᵝ cryptosystem and a signing scheme based on bivariate function hard problem and discrete logarithm problem
by: Abd Ghafar, Amir Hamzah
Published: (2015)
by: Abd Ghafar, Amir Hamzah
Published: (2015)
Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
by: Lim, Tsu Chean, et al.
Published: (2018)
by: Lim, Tsu Chean, et al.
Published: (2018)
A new tv-based database encryption scheme using ts block cipher
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
Algorithms for some hard knapsack problems
by: Kulanoot, Araya
Published: (2000)
by: Kulanoot, Araya
Published: (2000)
Lattice Boltzmann Numerical Scheme for the Simulation of Natural Convection in an Inclined Square Cavity
by: N.I, Nik Izual, et al.
Published: (2010)
by: N.I, Nik Izual, et al.
Published: (2010)
A hybrid scheme for wireless physical layer security based on encryption and channel pre-compensation
by: Tahir, Mohammad, et al.
Published: (2014)
by: Tahir, Mohammad, et al.
Published: (2014)
Off-line keyword guessing attacks on recent Public Key Encryption with Keyword Search Schemes
by: Wei-Chuen, Yau, et al.
Published: (2008)
by: Wei-Chuen, Yau, et al.
Published: (2008)
Similar Items
-
An upgrade on the key generation algorithm of the GGH-MKA lattice-based encryption scheme
by: Arif, Mandangan, et al.
Published: (2021) -
On the smallest-basis problem underlying the GGH lattice-based cryptosystem
by: Mandangan, Arif, et al.
Published: (2019) -
A security upgrade on the GGH lattice-based cryptosystem
by: Arif Mandangan,, et al.
Published: (2020) -
The efficiency of embedding-based attacks on the GGH lattice-based cryptosystem
by: Mandangan,, A., et al.
Published: (2023) -
Square integer matrix with a single non-integer entry in its inverse
by: Mandangan, Arif, et al.
Published: (2021)