You are looking at a specific version 20110614:195353 of this paper.
See the latest version.
Paper 2010/591
Bonsai Trees, or How to Delegate a Lattice Basis
David Cash and Dennis Hofheinz and Eike Kiltz and Chris Peikert
Abstract
We introduce a new \emph{lattice-based} cryptographic structure called a \emph{bonsai tree}, and use it to resolve some important open problems in the area. Applications of bonsai trees include: \begin{itemize} \item An efficient, stateless `hash-and-sign' signature scheme in the \emph{standard model} (i.e., no random oracles), and \item The first \emph{hierarchical} identity-based encryption (HIBE) scheme (also in the standard model) that does not rely on bilinear pairings. \end{itemize} Interestingly, the abstract properties of bonsai trees seem to have no known realization in conventional number-theoretic cryptography.
Note: Updated version.
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. Full version of paper in Eurocrypt 2010.
- Keywords
- latticestrapdoor functionssignatureshierarchical identity-based encryption
- Contact author(s)
- cpeikert @ cc gatech edu
- History
- 2011-06-14: last of 2 revisions
- 2010-11-23: received
- See all versions
- Short URL
- https://ia.cr/2010/591
- License
-
CC BY