{"id":"https://openalex.org/W2986713300","doi":"https://doi.org/10.1145/3338511.3357349","title":"A Framework for Efficient Lattice-Based DAA","display_name":"A Framework for Efficient Lattice-Based DAA","publication_year":2019,"publication_date":"2019-11-08","ids":{"openalex":"https://openalex.org/W2986713300","doi":"https://doi.org/10.1145/3338511.3357349","mag":"2986713300"},"language":"en","primary_location":{"id":"doi:10.1145/3338511.3357349","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3338511.3357349","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037735790","display_name":"Liqun Chen","orcid":"https://orcid.org/0000-0003-2680-4907"},"institutions":[{"id":"https://openalex.org/I28290843","display_name":"University of Surrey","ror":"https://ror.org/00ks66431","country_code":"GB","type":"education","lineage":["https://openalex.org/I28290843"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Liqun Chen","raw_affiliation_strings":["University of Surrey, Guildford, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Surrey, Guildford, United Kingdom","institution_ids":["https://openalex.org/I28290843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001231325","display_name":"Nada El Kassem","orcid":"https://orcid.org/0000-0002-2827-6493"},"institutions":[{"id":"https://openalex.org/I28290843","display_name":"University of Surrey","ror":"https://ror.org/00ks66431","country_code":"GB","type":"education","lineage":["https://openalex.org/I28290843"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Nada El Kassem","raw_affiliation_strings":["University of Surrey, Guildford, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Surrey, Guildford, United Kingdom","institution_ids":["https://openalex.org/I28290843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044041318","display_name":"Anja Lehmann","orcid":"https://orcid.org/0000-0002-2872-7899"},"institutions":[{"id":"https://openalex.org/I4210126328","display_name":"IBM Research - Zurich","ror":"https://ror.org/02js37d36","country_code":"CH","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210126328"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Anja Lehmann","raw_affiliation_strings":["IBM Research -- Zurich, Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"IBM Research -- Zurich, Zurich, Switzerland","institution_ids":["https://openalex.org/I4210126328"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074391920","display_name":"Vadim Lyubashevsky","orcid":"https://orcid.org/0009-0003-5149-264X"},"institutions":[{"id":"https://openalex.org/I4210126328","display_name":"IBM Research - Zurich","ror":"https://ror.org/02js37d36","country_code":"CH","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210126328"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Vadim Lyubashevsky","raw_affiliation_strings":["IBM Research -- Zurich, Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"IBM Research -- Zurich, Zurich, Switzerland","institution_ids":["https://openalex.org/I4210126328"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5037735790"],"corresponding_institution_ids":["https://openalex.org/I28290843"],"apc_list":null,"apc_paid":null,"fwci":0.42,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.71880302,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"23","last_page":"34"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/post-quantum-cryptography","display_name":"Post-quantum cryptography","score":0.7419559955596924},{"id":"https://openalex.org/keywords/discrete-logarithm","display_name":"Discrete logarithm","score":0.726871907711029},{"id":"https://openalex.org/keywords/learning-with-errors","display_name":"Learning with errors","score":0.6259747743606567},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6239733695983887},{"id":"https://openalex.org/keywords/ntru","display_name":"NTRU","score":0.6072624921798706},{"id":"https://openalex.org/keywords/lattice-based-cryptography","display_name":"Lattice-based cryptography","score":0.6047171950340271},{"id":"https://openalex.org/keywords/factoring","display_name":"Factoring","score":0.5551128387451172},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.5215585231781006},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.4774071276187897},{"id":"https://openalex.org/keywords/lattice","display_name":"Lattice (music)","score":0.4306773841381073},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.42784351110458374},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.42415156960487366},{"id":"https://openalex.org/keywords/ring-signature","display_name":"Ring signature","score":0.416642963886261},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.36723530292510986},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.35025185346603394},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.31511205434799194},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.30780667066574097},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.2816507816314697},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.27205291390419006},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2606518268585205},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.2064875066280365},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.1754627525806427},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.14315176010131836}],"concepts":[{"id":"https://openalex.org/C108277079","wikidata":"https://www.wikidata.org/wiki/Q7233576","display_name":"Post-quantum cryptography","level":4,"score":0.7419559955596924},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.726871907711029},{"id":"https://openalex.org/C2779014939","wikidata":"https://www.wikidata.org/wiki/Q6510239","display_name":"Learning with errors","level":3,"score":0.6259747743606567},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6239733695983887},{"id":"https://openalex.org/C122368425","wikidata":"https://www.wikidata.org/wiki/Q6955493","display_name":"NTRU","level":4,"score":0.6072624921798706},{"id":"https://openalex.org/C137660015","wikidata":"https://www.wikidata.org/wiki/Q6497083","display_name":"Lattice-based cryptography","level":5,"score":0.6047171950340271},{"id":"https://openalex.org/C177225278","wikidata":"https://www.wikidata.org/wiki/Q192674","display_name":"Factoring","level":2,"score":0.5551128387451172},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.5215585231781006},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.4774071276187897},{"id":"https://openalex.org/C2781204021","wikidata":"https://www.wikidata.org/wiki/Q6497091","display_name":"Lattice (music)","level":2,"score":0.4306773841381073},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.42784351110458374},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.42415156960487366},{"id":"https://openalex.org/C168941894","wikidata":"https://www.wikidata.org/wiki/Q3483645","display_name":"Ring signature","level":4,"score":0.416642963886261},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36723530292510986},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.35025185346603394},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.31511205434799194},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.30780667066574097},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.2816507816314697},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.27205291390419006},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2606518268585205},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.2064875066280365},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.1754627525806427},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.14315176010131836},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3338511.3357349","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3338511.3357349","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6800000071525574,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":55,"referenced_works":["https://openalex.org/W15438779","https://openalex.org/W34386251","https://openalex.org/W49132692","https://openalex.org/W54033425","https://openalex.org/W62933689","https://openalex.org/W74973629","https://openalex.org/W110088396","https://openalex.org/W121367636","https://openalex.org/W139987668","https://openalex.org/W147565578","https://openalex.org/W220935706","https://openalex.org/W345037154","https://openalex.org/W1527005907","https://openalex.org/W1531230025","https://openalex.org/W1546634390","https://openalex.org/W1752323684","https://openalex.org/W1865317441","https://openalex.org/W1936753088","https://openalex.org/W1978183200","https://openalex.org/W2038761522","https://openalex.org/W2071825329","https://openalex.org/W2098290658","https://openalex.org/W2122973102","https://openalex.org/W2134071831","https://openalex.org/W2148820333","https://openalex.org/W2159372323","https://openalex.org/W2233023171","https://openalex.org/W2296119288","https://openalex.org/W2478290527","https://openalex.org/W2517225079","https://openalex.org/W2552176082","https://openalex.org/W2594057045","https://openalex.org/W2605376357","https://openalex.org/W2606810880","https://openalex.org/W2751989631","https://openalex.org/W2771817079","https://openalex.org/W2791664942","https://openalex.org/W2794943678","https://openalex.org/W2886714247","https://openalex.org/W2888401937","https://openalex.org/W2890203463","https://openalex.org/W2890695144","https://openalex.org/W2944138498","https://openalex.org/W2956049765","https://openalex.org/W2967347604","https://openalex.org/W2970132762","https://openalex.org/W3003231116","https://openalex.org/W4229560060","https://openalex.org/W4232485878","https://openalex.org/W4285719527","https://openalex.org/W6602530202","https://openalex.org/W6638916605","https://openalex.org/W6678504847","https://openalex.org/W6689293746","https://openalex.org/W6734513817"],"related_works":["https://openalex.org/W3172324685","https://openalex.org/W3204214465","https://openalex.org/W2001945625","https://openalex.org/W4280589839","https://openalex.org/W4226072508","https://openalex.org/W4385711271","https://openalex.org/W4385654443","https://openalex.org/W2913364296","https://openalex.org/W3127629500","https://openalex.org/W2398072191"],"abstract_inverted_index":{"Currently":[0],"standardized":[1],"Direct":[2,32],"Anonymous":[3,33],"Attestation":[4,34],"(DAA)":[5],"schemes":[6],"have":[7],"their":[8],"security":[9,48],"based":[10],"on":[11],"the":[12,15,56,62,66],"factoring":[13],"and":[14,19,69],"discrete":[16],"logarithm":[17],"problems,":[18],"are":[20],"therefore":[21],"insecure":[22],"against":[23],"quantum":[24],"attackers.":[25],"This":[26],"paper":[27],"presents":[28],"a":[29,43],"quantum-safe":[30],"lattice-based":[31],"protocol":[35],"that":[36],"can":[37],"be":[38],"suitable":[39],"for":[40],"inclusion":[41],"in":[42,55],"future":[44],"quantum-resistant":[45],"TPM.":[46],"The":[47,72],"of":[49,65,75,89],"our":[50,76],"proposed":[51,77],"scheme":[52,79],"is":[53,80,84],"proved":[54],"Universal":[57],"Composability":[58],"(UC)":[59],"model":[60],"under":[61],"assumed":[63],"hardness":[64],"Ring-SIS,":[67],"Ring-LWE,":[68],"NTRU":[70],"problems.":[71],"signature":[73],"size":[74],"DAA":[78,96],"around":[81],"2MB,":[82],"which":[83],"(at":[85],"least)":[86],"two":[87],"orders":[88],"magnitude":[90],"smaller":[91],"compared":[92],"to":[93],"existing":[94],"post-quantum":[95],"schemes.":[97]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
