Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,321 papers from all fields of science
Search
Sign In
Create Free Account
Short integer solution problem
Known as:
Short Integer Solution (SIS) Problem
Short integer solution (SIS) and ring-SIS problems are two average-case problems that are used in lattice-based cryptography constructions. Lattice…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Homomorphic encryption
Ideal lattice cryptography
Lattice problem
Learning with errors
Expand
Broader (2)
Lattice-based cryptography
Post-quantum cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Combined authentication schemes with increasing level of resistance and methods for improving the security of electronic signature schemes: kombinirovannye skhemy autentifikacii s povyshennym urovnem…
A. Komarova
,
A. Korobeynikov
International Conference on Security of…
2019
Corpus ID: 208277993
The highly topical and groundbreaking issue of many studies is quantum technology. More and more articles appear not only in the…
Expand
2019
2019
Leveled Lattice-Based Linearly Homomorphic Signature Scheme in the Standard Model for Network Coding
Fenghe Wang
,
Shaoquan Shi
,
Chunxiao Wang
International Conference on Foundations of…
2019
Corpus ID: 209067432
Linearly homomorphic signature scheme is an important cryptographic primitive which can be used to against the pollution attacks…
Expand
2019
2019
Noninteractive Zero Knowledge Proof System for NP from Ring LWE
Wenping Ma
IACR Cryptology ePrint Archive
2019
Corpus ID: 202632547
A hash function family is called correlation intractable if for all sparse relations, it hard to find, given a random function…
Expand
2018
2018
Quantum Algorithms for Optimization and Polynomial Systems Solving over Finite Fields
Yu-Ao Chen
,
X. Gao
,
C. Yuan
arXiv.org
2018
Corpus ID: 126400476
In this paper, we give quantum algorithms for two fundamental computation problems: solving polynomial systems and optimization…
Expand
2017
2017
Lattice-based proxy signature scheme with reject sampling method
Z. L. Jiang
,
Yudong Liang
,
Zechao Liu
,
Xuan Wang
International Conference on Security, Pattern…
2017
Corpus ID: 3676672
A proxy signature scheme permits an entity to delegate its signing rights to another. Proxy signature scheme has been widely used…
Expand
2015
2015
Cryptographic tools for the cloud
S. Gorbunov
2015
Corpus ID: 708526
Classical cryptography is playing a major role in securing the Internet. Banking transactions, medical records, personal and…
Expand
2015
2015
Post-quantum Secure Hybrid Ring Signcryption Scheme from Lattice Assumption
Chunxiao Wang
,
Fenghe Wang
2015
Corpus ID: 67789748
The signcryption tag-KEM/DEM construction is naturally extended to the ring signcryption in this paper. The security model of…
Expand
2014
2014
A novel fuzzy identity based signature scheme based on the short integer solution problem
Yanqing Yao
,
Zhoujun Li
Computers & electrical engineering
2014
Corpus ID: 30777280
2011
2011
Hierarchical ID-Based Blind Signature from Lattices
Chen Liang
,
Cui Yongquan
,
T. Xueming
,
Hu Dongping
,
Wan Xin
Seventh International Conference on Computational…
2011
Corpus ID: 122536168
Blind signature offer the protection for sender's privacy and become an important primitive for electronic commerce. In this…
Expand
Review
2010
Review
2010
New Lattice-Based Public-Key Cryptosystem
Y. Jiang
,
Xiuling Ju
,
Feng Shi
Third International Symposium on Intelligent…
2010
Corpus ID: 2578196
Because of the advantages of lattice related problems as opposed to factoring and discrete problems, lattice based cryptographic…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required