High-Speed Signatures from Standard Lattices

@inproceedings{Dagdelen2014HighSpeedSF,
  title={High-Speed Signatures from Standard Lattices},
  author={{\"O}zg{\"u}r Dagdelen and Rachid El Bansarkhani and Florian G{\"o}pfert and Tim G{\"u}neysu and Tobias Oder and Thomas P{\"o}ppelmann and Ana Helena S{\'a}nchez and Peter Schwabe},
  booktitle={LATINCRYPT},
  year={2014}
}
  • Özgür Dagdelen, Rachid El Bansarkhani, +5 authors Peter Schwabe
  • Published in LATINCRYPT 2014
  • Computer Science
  • At CT-RSA 2014 Bai and Galbraith proposed a lattice-based signature scheme optimized for short signatures and with a security reduction to hard standard lattice problems. In this work we first refine the security analysis of the original work and propose a new 128-bit secure parameter set chosen for software efficiency. Moreover, we increase the acceptance probability of the signing algorithm through an improved rejection condition on the secret keys. Our software implementation targeting Intel… CONTINUE READING

    Figures, Tables, and Topics from this paper.

    Explore key concepts

    Links to highly relevant papers for key concepts in this paper:

    Citations

    Publications citing this paper.
    SHOWING 1-10 OF 39 CITATIONS

    Lattice-Based Signature Schemes and Their Sensitivity to Fault Attacks

    VIEW 1 EXCERPT
    CITES BACKGROUND

    The Lattice-Based Digital Signature Scheme qTESLA

    VIEW 2 EXCERPTS
    CITES BACKGROUND

    Efficient KEA-Style Lattice-Based Authenticated Key Exchange

    VIEW 1 EXCERPT
    CITES METHODS

    FILTER CITATIONS BY YEAR

    2014
    2019

    CITATION STATISTICS

    • 1 Highly Influenced Citations

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 48 REFERENCES

    Lattice Signatures and Bimodal Gaussians

    VIEW 11 EXCERPTS
    HIGHLY INFLUENTIAL

    Lattice Signatures Without Trapdoors

    Beyond ECDSA and RSA: Lattice-based digital signatures on constrained devices

    VIEW 1 EXCERPT

    Better Key Sizes (and Attacks) for LWE-Based Encryption

    VIEW 7 EXCERPTS
    HIGHLY INFLUENTIAL