LLL for ideal lattices: re-evaluation of the security of Gentry-Halevi's FHE scheme.
Thomas PlantardWilly SusiloZhenfei ZhangPublished in: Des. Codes Cryptogr. (2015)
Keyphrases
- access control
- digital signature scheme
- identity based cryptography
- protection scheme
- blind signature scheme
- security issues
- neural network
- high security
- authentication protocol
- computer security
- elliptic curve
- security systems
- security level
- secure communication
- diffie hellman
- security measures
- security analysis
- provably secure
- key management
- elliptic curve cryptography
- security mechanisms
- intrusion detection