Lattice-based Cryptography

From MaRDI portal
Revision as of 05:19, 5 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3613268

DOI10.1007/978-3-540-88702-7_5zbMath1161.81324OpenAlexW1598269861MaRDI QIDQ3613268

Daniele Micciancio, Oded Regev

Publication date: 12 March 2009

Published in: Post-Quantum Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-88702-7_5






Related Items (only showing first 100 items - show all)

Cyclic lattices, ideal lattices, and bounds for the smoothing parameterOn the LWE cryptosystem with more general disturbanceOn the high dimensional RSA algorithm -- a public key cryptosystem based on lattice and algebraic number theoryEvaluating the security of CRYSTALS-Dilithium in the quantum random oracle modelProvable dual attacks on learning with errorsReduction from sparse LPN to LPN, dual attack 3.0Further improvements of the estimation of key enumeration with applications to solving LWEAggregating Falcon signatures with LaBRADORGreyhound: fast polynomial commitments from latticesLattice-based key exchange on small integer solution problemEfficient Post-quantum SNARKs for RSIS and RLWE and Their Applications to PrivacyShort Zero-Knowledge Proof of Knowledge for Lattice-Based CommitmentA compressed \(\varSigma \)-protocol theory for latticesA trace map attack against special ring-LWE samplesPolly cracker, revisitedHomomorphic Encryption StandardHomomorphic AES evaluation using the modified LTV schemeQuantum Homomorphic Encryption for Circuits of Low T-gate ComplexityCoded-BKW: Solving LWE Using Lattice CodesProvably Weak Instances of Ring-LWECryptanalysis of the Co-ACD AssumptionSolving the search-LWE problem over projected latticesAn extension of Kannan's embedding for solving ring-based LWE problemsFiat-Shamir and correlation intractability from strong KDM-secure encryptionOn the Efficacy of Solving LWE by Reduction to Unique-SVPVandermonde meets Regev: public key encryption schemes based on partial Vandermonde problemsTightly secure ring-LWE based key encapsulation with short ciphertextsA Ring-LWE-based digital signature inspired by Lindner-Peikert schemeThe polynomial learning with errors problem and the smearing conditionLattices from codes over \(\mathbb {Z}_q\): generalization of constructions \(D\), \(D'\) and \(\overline{D}\)A Fast Phase-based Enumeration Algorithm for SVP Challenge Through $$y$$-Sparse Representations of Short Lattice VectorsProperties of constacyclic codes under the Schur productEfficient Integer Encoding for Homomorphic Encryption via Ring IsomorphismsSharper bounds on four lattice constantsCryptanalysis of the CLR-cryptosystemPredicting the concrete security of LWE against the dual attack using binary searchEstimation of the hardness of the learning with errors problem with a restricted number of samplesPotLLL: a polynomial time version of LLL with deep insertionsFaster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALSGeneralized attack on ECDSA: known bits in arbitrary positionsHardness of \(k\)-LWE and applications in traitor tracingDigital Signatures Based on the Hardness of Ideal Lattice Problems in All RingsPreventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption SchemeThe linear transformation that relates the canonical and coefficient embeddings of ideals in cyclotomic integer ringsEHNP strikes back: analyzing SM2 implementationsSolving LWR via BDD Strategy: Modulus Switching ApproachHandle the traces: revisiting the attack on ECDSA with EHNPA bivariate polynomial-based cryptographic hard problem and its applicationsA closest vector problem arising in radiation therapy planningOn the asymptotic complexity of solving LWEThe Efficiency of Embedding-Based Attacks on the GGH Lattice-Based CryptosystemFast practical lattice reduction through iterated compressionDoes the dual-sieve attack on learning with errors even work?Statistical-computational trade-offs in tensor PCA and related problems via communication complexityA New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusionLattice-Based Proof of a ShuffleConcrete security from worst-case to average-case lattice reductionsFinding and evaluating parameters for BGVOn elliptic curve $L$-functions integrated encryption schemeAttacks on the Search RLWE Problem with Small ErrorsEstimating quantum speedups for lattice sievesTuple lattice sievingImproved combinatorial algorithms for the inhomogeneous short integer solution problemQuantum Cryptography: Key Distribution and BeyondPublic key compression for constrained linear signature schemesUnnamed ItemAn Experimental Study of Kannan’s Embedding Technique for the Search LWE ProblemFractional LWE: A Nonlinear Variant of LWEParameterized Intractability of Even Set and Shortest Vector Problem from Gap-ETHAlgorithms for the Shortest and Closest Lattice Vector ProblemsA Signcryption Scheme Based Learning with Errors over Rings Without TrapdoorNew Algorithms for Learning in Presence of ErrorsA lattice-based group signature scheme with verifier-local revocationThe polynomial approximate common divisor problem and its application to the fully homomorphic encryptionBounds for the \(l_1\)-distance of \(q\)-ary lattices obtained via constructions \(\mathrm D\), \(\mathrm D'\) and \(\overline{\mathrm D}\)Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distanceImproved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and ApplicationsOn the complexity of the BKW algorithm on LWEGenerating shorter bases for hard random latticesOn Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEALUnnamed ItemRigorous and Efficient Short Lattice Vectors EnumerationPost-quantum cryptography for healthcare: a number theory based two-factor mutual authentication and key exchange protocol over lattices for TMISVerification of NP-Hardness Reduction Functions for Exact Lattice ProblemsFinding Shortest Lattice Vectors in the Presence of GapsImproved attacks on knapsack problem with their variants and a knapsack type ID-schemePost-Quantum Forward-Secure Onion RoutingIntegrability and complexity in quantum spin chainsForward security of Fiat-Shamir lattice signaturesImprovements in the analysis of Kannan's CVP algorithmPractical lattice-based distributed signatures for a small number of signersRigorous foundations for dual attacks in coding theoryA secure hierarchical deterministic wallet with stealth address from latticesOn lattice constructions \(D\) and \(D^\prime\) from \(q\)-ary linear codesLattice-based polynomial commitments: towards asymptotic and concrete efficiencyBetter Key Sizes (and Attacks) for LWE-Based EncryptionA generalization of NTRUEncryptInteger Version of Ring-LWE and Its ApplicationsLearning a parallelepiped: Cryptanalysis of GGH and NTRU signaturesOn bounded distance decoding with predicate: breaking the ``lattice barrier for the hidden number problem





This page was built for publication: Lattice-based Cryptography