Gladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed Decryption
From MaRDI portal
Publication:6041282
DOI10.1007/978-3-030-92068-5_5zbMath1514.94069OpenAlexW3129081080MaRDI QIDQ6041282
Varun Maram, Kelong Cong, Daniele Cozzo, Nigel P. Smart
Publication date: 26 May 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/20.500.11850/502280
Related Items
Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext, Hardness of (M)LWE with semi-uniform seeds
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Securing threshold cryptosystems against chosen ciphertext attack
- Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
- Threshold cryptosystems from threshold fully homomorphic encryption
- A modular analysis of the Fujisaki-Okamoto transformation
- Estimate all the {LWE, NTRU} schemes!
- Secure integration of asymmetric and symmetric encryption schemes
- Threshold schemes from isogeny assumptions
- Sharing the LUOV: threshold post-quantum signatures
- Adding distributed decryption and key generation to a ring-LWE based CCA encryption scheme
- Error detection in monotone span programs with application to communication-efficient multi-party computation
- How to record quantum queries, and applications to quantum indifferentiability
- Tag-KEM/DEM: A new framework for hybrid encryption
- On the Hardness of Learning with Rounding over Small Modulus
- Learning with Rounding, Revisited
- Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions
- Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
- Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting
- Multiparty Computation from Somewhat Homomorphic Encryption
- Semi-homomorphic Encryption and Multiparty Computation
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
- Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems
- Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM
- Secure Two-Party Computation Is Practical
- Securing threshold cryptosystems against chosen ciphertext attack
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Sashimi: Cutting up CSI-FiSh Secret Keys to Produce an Actively Secure Distributed Signing Protocol
- Cryptography and Coding
- Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol
- Theory of Cryptography