Abstract
In this talk, we will introduce abstract tools and techniques for working with lattices from the perspective of a cryptographic protocol designer. We will also show how to apply these tools to yield a number of provably secure public-key primitives ranging from digital signatures and public-key encryption, to more advanced protocols such as (hierarchical) identity-based encryption.
Chapter PDF
Similar content being viewed by others
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kiltz, E. (2010). Cryptographic Protocols from Lattices. In: Heng, SH., Kurosawa, K. (eds) Provable Security. ProvSec 2010. Lecture Notes in Computer Science, vol 6402. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16280-0_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-16280-0_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16279-4
Online ISBN: 978-3-642-16280-0
eBook Packages: Computer ScienceComputer Science (R0)