Learning with Rounding, Revisited

From MaRDI portal
Revision as of 19:22, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:2845660

DOI10.1007/978-3-642-40041-4_4zbMath1310.94123OpenAlexW38127577MaRDI QIDQ2845660

Daniel Wichs, Krzysztof Pietrzak, Joël Alwen, Stephan Krenn

Publication date: 2 September 2013

Published in: Advances in Cryptology – CRYPTO 2013 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-40041-4_4





Related Items (45)

Witness Maps and ApplicationsAlmost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and MoreAdaptively secure distributed PRFs from LWEApproximate-Deterministic Public Key Encryption from Hard Learning ProblemsClassical Verification of Quantum ComputationsGladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed DecryptionOn homomorphic secret sharing from polynomial-modulus LWELogarithmic-size (linkable) threshold ring signatures in the plain modelComputational fuzzy extractor from LWECumulatively all-lossy-but-one trapdoor functions from standard assumptionsHow to build a trapdoor function from an encryption schemeLeveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with RoundingLockable obfuscation from circularly insecure fully homomorphic encryptionLattice-based authenticated key exchange with tight securityAlmost tight multi-user security under adaptive corruptions from LWE in the standard modelA lower bound for proving hardness of learning with rounding with polynomial modulusHardness of (M)LWE with semi-uniform seedsLattice-based e-cash, revisitedBi-homomorphic Lattice-Based PRFs and Unidirectional Updatable EncryptionTighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge SettingNTRU prime: reducing attack surface at low costPseudorandom functions in NC class from the standard LWE assumptionImproved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distanceHardness of entropic module-LWEOn the Hardness of Learning with Rounding over Small ModulusWatermarking PRFs and PKE against quantum adversariesTighter security proofs for GPV-IBE in the quantum random oracle modelTighter security for generic authenticated key exchange in the QROMAdaptively secure distributed PRFs from \(\mathsf{LWE}\)\textsf{SMAUG}: pushing lattice-based key encapsulation mechanisms to the limitsRing/module learning with errors under linear leakage -- hardness and applicationsCompact selective opening security from LWEFast public-key silent OT and more from constrained Naor-ReingoldPost-quantum cryptosystems: open problems and solutions. Lattice-based cryptosystemsCCA-security from adaptive all-but-one lossy trapdoor functionsHomomorphic Evaluation of Lattice-Based Symmetric Encryption SchemesRate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacksTowards Sound Fresh Re-keying with Hard (Physical) Learning ProblemsIncompressible encodingsAdaptively secure constrained pseudorandom functions in the standard modelRounding in the ringsA new post-quantum multivariate polynomial public key encapsulation algorithmPseudorandom Functions: Three Decades LaterHardness of LWE on general entropic distributionsKey-homomorphic pseudorandom functions from LWE with small modulus







This page was built for publication: Learning with Rounding, Revisited