SLIDE 1
Lattice-Based Cryptography
- Post-quantum cryptography
- Ajtai-Dwork: public-key crypto based on a shortest vector
problem (1997)
- Hoffstein-Pipher-Silverman: NTRU working in
Z[X]/(X N − 1) (1998) – now standardized
- Gentry: Homomorphic encryption using ideal lattices
(2009)
- Privacy Applications
- 1. Medical records
- 2. Machine learning and outsourced computation
- 3. Genomic computation