{"description":"V. Lyubashevsky \"Lattice-based identification schemes secure under active attacks\" PKC 2008 (To appear) PKC 2008\u306eNotification\u304c\u4eca\u65e5\u306a\u306e\u3067\u51fa\u305f\u69d8\u5b50. PKC 2008\u306e\u30b5\u30a4\u30c8\u306b\u306f\u307e\u3060\u30ea\u30b9\u30c8\u306f\u7121\u3044. Feige-Shamir\u306eOR construction\u306b\u4e57\u305b\u308b\u3068WI\u304c\u8a00\u3048\u308b\u306e\u3067\u5143\u3005Micciancio-Vadhan\u306e\u30bc\u30ed\u77e5\u8b58\u304b\u3089\u3082\u4e0a\u8a18\u306e\u3088\u3046\u306a\u3053\u3068\u306f\u8a00\u3048\u308b. TCC 2008\u306b\u51fa\u308bMicciancio-Lyubashevsky\u306e\u683c\u5b50\u30d9\u30fc\u30b9\u306e\u7f72\u540d\u304b\u3089\u6d3e\u751f\u3057\u3066\u308b\u306e\u304b? \u73fe\u7269\u304c\u2026","width":"100%","height":"190","version":"1.0","title":" \u683c\u5b50\u30d9\u30fc\u30b9\u306e\u8a8d\u8a3c\u65b9\u5f0f","provider_url":"https://hatena.blog","author_name":"smoking186","author_url":"https://blog.hatena.ne.jp/smoking186/","published":"2007-11-21 10:38:04","url":"https://186.hatenablog.com/entry/20071121/1195609084","provider_name":"Hatena Blog","blog_title":"186 @ hatenablog","type":"rich","categories":["crypt"],"blog_url":"https://186.hatenablog.com/","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2F186.hatenablog.com%2Fentry%2F20071121%2F1195609084\" title=\" \u683c\u5b50\u30d9\u30fc\u30b9\u306e\u8a8d\u8a3c\u65b9\u5f0f - 186 @ hatenablog\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","image_url":null}