A Subfield Lattice Attack on Overstretched NTRU Assumptions

From MaRDI portal
Publication:2835586

DOI10.1007/978-3-662-53018-4_6zbMath1351.94019OpenAlexW2477092523MaRDI QIDQ2835586

Léo Ducas, Martin R. Albrecht, Shi Bai

Publication date: 30 November 2016

Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-53018-4_6




Related Items

How to meet ternary LWE keysTowards faster polynomial-time lattice reductionA trace map attack against special ring-LWE samplesAlgorithmic acceleration of B/FV-like somewhat homomorphic encryption for compute-enabled RAMThe MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacksReturn of GGH15: provable security against zeroizing attacksConstructions for quantum indistinguishability obfuscationMulti-key FHE from LWE, RevisitedFaster homomorphic encryption over GPGPUs via hierarchical DGTGadget-based iNTRU lattice trapdoorsQuantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptionsNTRU Fatigue: How Stretched is Overstretched?Digital Signatures Based on the Hardness of Ideal Lattice Problems in All RingsFlattening NTRU for evaluation key free homomorphic encryptionCharacterizing overstretched NTRU attacksA thorough treatment of highly-efficient NTRU instantiationsOn the security of functional encryption in the generic group modelRevisiting lower dimension lattice attacks on NTRUFiat-Shamir signatures based on module-NTRUA polynomial time algorithm for breaking NTRU encryption with multiple keysFINAL: faster FHE instantiated with NTRU and LWEMulti-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrappingSubfield attacks on HSVP in ideal latticesD-NTRU: more efficient and average-case IND-CPA secure NTRU variantMultikey Fully Homomorphic Encryption and ApplicationsOn the hardness of the NTRU problemA full RNS variant of FV like somewhat homomorphic encryption schemesSubfield algorithms for ideal- and module-SVP based on the decomposition groupAn algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zeroMaliciously circuit-private multi-key FHE and MPC based on LWEA Practical Post-Quantum Public-Key Cryptosystem Based on $$\textsf {spLWE}$$On Rectangular Unimodular Matrices over the Algebraic IntegersProvably secure NTRUEncrypt over any cyclotomic fieldA Lattice Attack on Homomorphic NTRU with Non-invertible Public KeysA public-key encryption scheme based on non-linear indeterminate equationsVulnerable public keys in NTRU cryptosystemCircuit-Private Multi-key FHEProvably Secure NTRU Instances over Prime Cyclotomic RingsRevisiting Lattice Attacks on Overstretched NTRU ParametersOne-Shot Verifiable Encryption from LatticesOn Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEALSomewhat/Fully Homomorphic Encryption: Implementation Progresses and ChallengesA framework for cryptographic problems from linear algebraModular lattice signatures, revisitedOn the ideal shortest vector problem over random rational primesThe Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEsAnnihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13Algebraic Aspects of Solving Ring-LWE, Including Ring-Based Improvements in the Blum--Kalai--Wasserman AlgorithmFast reduction of algebraic lattices over cyclotomic fieldsCryptanalyses of Candidate Branching Program Obfuscators


Uses Software


Cites Work