Gottfried Herold
Ruhr University Bochum
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Gottfried Herold.
international cryptology conference | 2014
Gottfried Herold; Julia Hesse; Dennis Hofheinz; Carla Ràfols; Andy Rupp
At Eurocrypt 2010, Freeman presented a framework to convert cryptosystems based on composite-order groups into ones that use prime-order groups. Such a transformation is interesting not only from a conceptual point of view, but also since for relevant parameters, operations in prime-order groups are faster than composite-order operations by an order of magnitude. Since Freeman’s work, several other works have shown improvements, but also lower bounds on the efficiency of such conversions.
Designs, Codes and Cryptography | 2016
Martin R. Albrecht; Jean-Charles Faugère; Pooya Farshim; Gottfried Herold; Ludovic Perret
We formally treat cryptographic constructions based on the hardness of deciding ideal membership in multivariate polynomial rings. Of particular interest to us is a class of schemes known as “Polly Cracker.” We start by formalising and studying the relation between the ideal membership problem and the problem of computing a Gröbner basis. We show both positive and negative results. On the negative side, we define a symmetric Polly Cracker encryption scheme and prove that this scheme only achieves bounded
Journal of Cryptology | 2017
Alex Escala; Gottfried Herold; Eike Kiltz; Carla Ràfols; Jorge L. Villar
Designs, Codes and Cryptography | 2018
Gottfried Herold; Elena Kirshanova; Alexander May
\mathsf {CPA}
international cryptology conference | 2016
Stefan Dziembowski; Sebastian Faust; Gottfried Herold; Anthony Journault; Daniel Masny; François-Xavier Standaert
public key cryptography | 2017
Gottfried Herold; Elena Kirshanova
CPA security under the hardness of the ideal membership problem. Furthermore, we show that a large class of algebraic transformations cannot convert this scheme to a fully secure Polly Cracker-style scheme. On the positive side, we formalise noisy variants of the ideal-theoretic problems. These problems can be seen as natural generalisations of the learning with errors (
public key cryptography | 2012
Gottfried Herold
security and cryptography for networks | 2012
Gottfried Herold; Alexander Meurer
\mathsf {LWE}
public key cryptography | 2017
Gottfried Herold; Alexander May
computer and communications security | 2017
Gottfried Herold; Max Hoffmann; Michael Klooß; Carla Ràfols; Andy Rupp
LWE) and the approximate GCD problems over polynomial rings. After formalising and justifying the hardness of the noisy assumptions, we show that noisy encoding of messages results in a fully