Naga Ayachitula, Melissa Buco, et al.
SCC 2007
We introduce a new lattice-based cryptographic structure called a bonsai tree, and use it to resolve some important open problems in the area. Applications of bonsai trees include an efficient, stateless hash-and-sign' signature scheme in the standard model (i.e., no random oracles), and the first hierarchical identity-based encryption (HIBE) scheme (also in the standard model) that does not rely on bilinear pairings. Interestingly, the abstract properties of bonsai trees seem to have no known realization in conventional number-theoretic cryptography. © International Association for Cryptologic Research 2011.
Naga Ayachitula, Melissa Buco, et al.
SCC 2007
J. LaRue, C. Ting
Proceedings of SPIE 1989
F.M. Schellenberg, M. Levenson, et al.
BACUS Symposium on Photomask Technology and Management 1991
Robert Manson Sawko, Malgorzata Zimon
SIAM/ASA JUQ