{"title":"教程:基于点阵的密码学","authors":"Rishiraj Bhattacharyya","doi":"10.1109/PKIA.2017.8278954","DOIUrl":null,"url":null,"abstract":"Lattice based cryptography has been a very active research area for the past 20 years. The field has gained special attraction due to the conjectured worst case hardness of lattice problems even against the quantum algorithms. In the upcoming Post Quantum Cryptographic Competition hosted by NIST, numerous candidates are anticipated to be based on lattices. Review of the principles behind the lattice based cryptography, present some basic constructions, and explore their relations with standard cryptographic constructions.","PeriodicalId":393622,"journal":{"name":"2017 International Conference on Public Key Infrastructure and its Applications (PKIA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Tutorials: Lattice based cryptgraphy\",\"authors\":\"Rishiraj Bhattacharyya\",\"doi\":\"10.1109/PKIA.2017.8278954\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Lattice based cryptography has been a very active research area for the past 20 years. The field has gained special attraction due to the conjectured worst case hardness of lattice problems even against the quantum algorithms. In the upcoming Post Quantum Cryptographic Competition hosted by NIST, numerous candidates are anticipated to be based on lattices. Review of the principles behind the lattice based cryptography, present some basic constructions, and explore their relations with standard cryptographic constructions.\",\"PeriodicalId\":393622,\"journal\":{\"name\":\"2017 International Conference on Public Key Infrastructure and its Applications (PKIA)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Public Key Infrastructure and its Applications (PKIA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PKIA.2017.8278954\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Public Key Infrastructure and its Applications (PKIA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PKIA.2017.8278954","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Lattice based cryptography has been a very active research area for the past 20 years. The field has gained special attraction due to the conjectured worst case hardness of lattice problems even against the quantum algorithms. In the upcoming Post Quantum Cryptographic Competition hosted by NIST, numerous candidates are anticipated to be based on lattices. Review of the principles behind the lattice based cryptography, present some basic constructions, and explore their relations with standard cryptographic constructions.