Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Daniele Micciancio is active.

Publication


Featured researches published by Daniele Micciancio.


SIAM Journal on Computing | 2007

Worst-Case to Average-Case Reductions Based on Gaussian Measures

Daniele Micciancio; Oded Regev

We show that finding small solutions to random modular linear equations is at least as hard as approximating several lattice problems in the worst case within a factor almost linear in the dimension of the lattice. The lattice problems we consider are the shortest vector problem, the shortest independent vectors problem, the covering radius problem, and the guaranteed distance decoding problem (a variant of the well-known closest vector problem). The approximation factor we obtain is


theory of cryptography conference | 2004

Soundness of formal encryption in the presence of active adversaries

Daniele Micciancio; Bogdan Warinschi

n \log^{O(1)} n


theory and application of cryptographic techniques | 2003

Foundations of group signatures: formal definitions, simplified requirements, and a construction based on general assumptions

Mihir Bellare; Daniele Micciancio; Bogdan Warinschi

for all four problems. This greatly improves on all previous work on the subject starting from Ajtai’s seminal paper [Generating hard instances of lattice problems, in Complexity of Computations and Proofs, Quad. Mat. 13, Dept. Math., Seconda Univ. Napoli, Caserta, Italy, 2004, pp. 1-32] up to the strongest previously known results by Micciancio [SIAM J. Comput., 34 (2004), pp. 118-169]. Our results also bring us closer to the limit where the problems are no longer known to be in NP intersect coNP. Our main tools are Gaussian measures on lattices and the high-dimensional Fourier transform. We start by defining a new lattice parameter which determines the amount of Gaussian noise that one has to add to a lattice in order to get close to a uniform distribution. In addition to yielding quantitatively much stronger results, the use of this parameter allows us to simplify many of the complications in previous work. Our technical contributions are twofold. First, we show tight connections between this new parameter and existing lattice parameters. One such important connection is between this parameter and the length of the shortest set of linearly independent vectors. Second, we prove that the distribution that one obtains after adding Gaussian noise to the lattice has the following interesting property: the distribution of the noise vector when conditioning on the final value behaves in many respects like the original Gaussian noise vector. In particular, its moments remain essentially unchanged.


SIAM Journal on Computing | 2001

The Shortest Vector in a Lattice is Hard to Approximate to within Some Constant

Daniele Micciancio

We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbitrary expressions built using encryption and concatenation operations. The method allows to express security properties and carry out proofs using a simple logic based language, where messages are represented by syntactic expressions, and does not require dealing with probability distributions or asymptotic notation explicitly. Still, we show that the method is sound, meaning that logic statements can be naturally interpreted in the computational setting in such a way that if a statement holds true for any abstract (symbolic) execution of the protocol in the presence of a Dolev-Yao adversary, then its computational interpretation is also correct in the standard computational model where the adversary is an arbitrary probabilistic polynomial time program. This is the first paper providing a simple framework for translating security proofs from the logic setting to the standard computational setting for the case of powerful active adversaries that have total control of the communication network.


international symposium on information theory | 2000

Hardness of approximating the minimum distance of a linear code

Daniele Micciancio; Ilya Dumer; Madhu Sudan

This paper provides theoretical foundations for the group signature primitive. We introduce strong, formal definitions for the core requirements of anonymity and traceability. We then show that these imply the large set of sometimes ambiguous existing informal requirements in the literature, thereby unifying and simplifying the requirements for this primitive. Finally we prove the existence of a construct meeting our definitions based only on the sole assumption that trapdoor permutations exist.


Lecture Notes in Computer Science | 2001

Improving Lattice Based Cryptosystems Using the Hermite Normal Form

Daniele Micciancio

We show that approximating the shortest vector problem (in any


SIAM Journal on Computing | 2013

A Deterministic Single Exponential Time Algorithm for Most Lattice Problems Based on Voronoi Cell Computations

Daniele Micciancio; Panagiotis Voulgaris

\ell_p


international cryptology conference | 2002

Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods

Tal Malkin; Daniele Micciancio; Sara K. Miner

norm) to within any constant factor less than


compiler construction | 2007

Generalized Compact Knapsacks, Cyclic Lattices, and Efficient One-Way Functions

Daniele Micciancio

\sqrt[p]2


foundations of computer science | 2004

Worst-case to average-case reductions based on Gaussian measures

Daniele Micciancio; Oded Regev

is hard for NP under reverse unfaithful random reductions with inverse polynomial error probability. In particular, approximating the shortest vector problem is not in RP (random polynomial time), unless NP equals RP. We also prove a proper NP-hardness result (i.e., hardness under deterministic many-one reductions) under a reasonable number theoretic conjecture on the distribution of square-free smooth numbers. As part of our proof, we give an alternative construction of Ajtais constructive variant of Sauers lemma that greatly simplifies Ajtais original proof.

Collaboration


Dive into the Daniele Micciancio's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Shafi Goldwasser

Weizmann Institute of Science

View shared research outputs
Top Co-Authors

Avatar

Mihir Bellare

University of California

View shared research outputs
Top Co-Authors

Avatar

Michael Walter

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge