Efficient Lattice (H)IBE in the Standard Model, EURO- CRYPT, pp.553-572, 2010. ,
DOI : 10.1007/978-3-642-13190-5_28
Generating hard instances of lattice problems (extended abstract), Proceedings of the twenty-eighth annual ACM symposium on Theory of computing , STOC '96, pp.99-108, 1996. ,
DOI : 10.1145/237814.237838
Generating Shorter Bases for Hard Random Lattices, International Symposium on Theoretical Aspects of Computer Science, pp.75-86, 2009. ,
DOI : 10.1007/s00224-010-9278-3
URL : https://hal.archives-ouvertes.fr/inria-00359718
Key-Private Proxy Re-encryption under LWE, Proc. of the 14th International Conference on Cryptology in India (INDOCRYPT 2013), pp.1-18, 2013. ,
DOI : 10.1007/978-3-319-03515-4_1
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems, Crypto, pp.595-618, 2009. ,
DOI : 10.1007/978-3-642-03356-8_35
Improved proxy re-encryption schemes with applications to secure distributed storage, 12th Annual Network and Distributed System Security Symposium, pp.29-35, 2005. ,
DOI : 10.1145/1127345.1127346
Divertible protocols and atomic proxy cryptography, Eurocrypt, pp.360-363, 1998. ,
DOI : 10.1007/BFb0054122
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.81.8246
Complexity of Lattice Problems: A Cryptographic Perspective, 2002. ,
DOI : 10.1007/978-1-4615-0897-7
Better Key Sizes (and Attacks) for LWE-Based Encryption, CT-RSA, pp.319-339, 2011. ,
DOI : 10.1007/3-540-45708-9_19
On lattices, learning with errors, random linear codes, and cryptography, STOC, pp.84-93, 2005. ,
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, In SIAM Journal on Computing, pp.1484-1509, 1997. ,
Lattice based efficient threshold public key encryption scheme, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), pp.93-107, 2013. ,
Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme, Journal of Internet Services and Information Security (JISIS), vol.3, issue.34, pp.38-51, 2013. ,
DOI : 10.1007/978-3-319-12060-7_6
Cryptography with Lattices, 2010. ,