Polynomial Commitments from Lattices: Post-Quantum Security, Fast Verification and Transparent Setup.
Valerio CiniGiulio MalavoltaNgoc Khanh NguyenHoeteck WeePublished in: IACR Cryptol. ePrint Arch. (2024)
Keyphrases
- high security
- java card
- integrity verification
- security issues
- model checking
- network security
- information security
- access control
- security threats
- security systems
- security requirements
- security policies
- intrusion detection
- high assurance
- cryptographic protocols
- face verification
- quantum computation
- security analysis
- information assurance
- information systems
- protocol specification
- quantum computing
- quantum mechanics
- smart card
- security problems
- security level
- statistical databases
- security protocols
- formal analysis
- formal methods