Modern Cryptography Volume 2 A Classical Introduction to Informational and Mathematical Principle

This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-qua...

Full description

Saved in:
Bibliographic Details
Main Author: Zheng, Zhiyong (auth)
Other Authors: Tian, Kun (auth), Liu, Fengxia (auth)
Format: Electronic Book Chapter
Language:English
Published: Singapore Springer Nature 2023
Series:Financial Mathematics and Fintech
Subjects:
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_94984
005 20221214
003 oapen
006 m o d
007 cr|mn|---annan
008 20221214s2023 xx |||||o ||| 0|eng d
020 |a 978-981-19-7644-5 
020 |a 9789811976445 
040 |a oapen  |c oapen 
024 7 |a 10.1007/978-981-19-7644-5  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a KCB  |2 bicssc 
072 7 |a PBW  |2 bicssc 
100 1 |a Zheng, Zhiyong  |4 auth 
700 1 |a Tian, Kun  |4 auth 
700 1 |a Liu, Fengxia  |4 auth 
245 1 0 |a Modern Cryptography Volume 2  |b A Classical Introduction to Informational and Mathematical Principle 
260 |a Singapore  |b Springer Nature  |c 2023 
300 |a 1 electronic resource (191 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Financial Mathematics and Fintech 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research. 
536 |a Renmin University of China 
540 |a Creative Commons  |f by/4.0/  |2 cc  |4 http://creativecommons.org/licenses/by/4.0/ 
546 |a English 
650 7 |a Macroeconomics  |2 bicssc 
650 7 |a Applied mathematics  |2 bicssc 
653 |a Post-Quantum Cryptography 
653 |a Gauss Lattice 
653 |a Reduction 
653 |a Learning With Errors 
653 |a FHE 
653 |a Fourier transform 
653 |a Ideal lattice 
653 |a NTRU 
653 |a Smoothing parameters 
653 |a Discrete Gaussian measure 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/bitstream/20.500.12657/60195/1/978-981-19-7644-5.pdf  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/94984  |7 0  |z DOAB: description of the publication