Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller

From MaRDI portal
Publication:2894439

DOI10.1007/978-3-642-29011-4_41zbMath1297.94090OpenAlexW74973629MaRDI QIDQ2894439

Chris Peikert, Daniele Micciancio

Publication date: 29 June 2012

Published in: Advances in Cryptology – EUROCRYPT 2012 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-29011-4_41




Related Items

Fully Homomorphic Encryption with Auxiliary InputsTrapdoors for Ideal Lattices with ApplicationsApproximate-Deterministic Public Key Encryption from Hard Learning ProblemsPredicate Encryption for Circuits from LWEMulti-key FHE from LWE, RevisitedDeniable Attribute Based Encryption for Branching Programs from LWETargeted Homomorphic Attribute-Based EncryptionZero-Knowledge Interactive Proof Systems for New Lattice ProblemsSponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length MessageA survey of lattice based expressive attribute based encryptionPost-quantum online voting schemeOn Key Recovery Attacks Against Existing Somewhat Homomorphic Encryption SchemesLattice-based secret handshakes with reusable credentialsEfficient and fully secure lattice-based IBE with equality testMore efficient construction of anonymous signaturesAugmented Learning with Errors: The Untapped Potential of the Error TermCryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013On the hardness of module learning with errors with short distributionsZero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group EncryptionSignature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice AssumptionsTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionFrom Identification to Signatures, Tightly: A Framework and Generic TransformsMulti-key Homomorphic AuthenticatorsPartitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear MapsA Homomorphic Proxy Re-encryption from LatticesAdaptively secure inner product encryption from LWENon-committing encryption with constant ciphertext expansion from standard assumptionsTowards classical hardness of module-LWE: the linear rank caseSuccinct LWE sampling, random polynomials, and obfuscationABE for DFA from LWE against bounded collusions, revisitedRing-based identity based encryption -- asymptotically shorter MPK and tighter securityTowards tight adaptive security of non-interactive key exchangeVector and functional commitments from latticesDirect computation of branching programs and its applications to more efficient lattice-based cryptographySimulatable verifiable random function from the LWE assumptionIdentity-Based Blind Signature from Lattices in Standard ModelMulti-bit Leveled Homomorphic Encryption via $$\mathsf {Dual.LWE}$$ -BasedA Practical Post-Quantum Public-Key Cryptosystem Based on $$\textsf {spLWE}$$Lattice-based FHE as secure as PKECryptogenographyLimits of random oracles in secure computationNon-commutative arithmetic circuits with divisionDecision trees, protocols and the entropy-influence conjectureLocally testable codes and cayley graphsInvitation games and the price of stabilityWelfare maximization and truthfulness in mechanism design with ordinal preferencesCoordination mechanisms from (almost) all scheduling policiesPrivate interactive communication across an adversarial channelTree codes and a conjecture on exponential sumsCapacity of non-malleable codesLinear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applicationsAdversarial hypothesis testing and a quantum stein's lemma for restricted measurementsSequential decision making with vector outcomesLearning mixtures of arbitrary distributions over large discrete domainsWhy do simple algorithms for triangle enumeration work in the real world?Black-box obfuscation for d-CNFsCandidate weak pseudorandom functions in AC 0 ○ MOD 2Iterated group products and leakage resilience against NC1Building one-time memories from isolated qubitsAttribute-efficient evolvability of linear functionsEnergy-efficient circuit designRate-independent computation in continuous chemical reaction networksTesters and their applicationsOn the automorphism groups of strongly regular graphs IFaster private release of marginals on small databasesMechanism design in large gamesRedrawing the boundaries on purchasing data from privacy-sensitive individualsApproximation schemes via Sherali-Adams hierarchy for dense constraint satisfaction problems and assignment problemsComplexity of approximating CSP with balance / hard constraintsInteger feasibility of random polytopesMultireference alignment using semidefinite programmingPartial tests, universal tests and decomposabilityHigh dimensional expanders and property testingParameterized testabilityDirect sum fails for zero error average communicationRational argumentsTwo Efficient Tag-Based Encryption Schemes on LatticesCompact Inner Product Encryption from LWECompact Hierarchical IBE from Lattices in the Standard ModelSimplified Revocable Hierarchical Identity-Based Encryption from LatticesLattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with EaseGeneric Construction of UC-Secure Oblivious TransferAdaptive Security with Quasi-Optimal RateDecompositions of Triangle-Dense GraphsLattice-based identity-based resplittable threshold public key encryption schemeAn LWE-based verifiable threshold secret sharing schemeClassical Homomorphic Encryption for Quantum CircuitsThe Geometry of Lattice CryptographyTuring Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded FunctionsThe Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEsHow (Not) to Instantiate Ring-LWEFHE Circuit Privacy Almost for FreeCryptanalysis of GGH15 Multilinear MapsThree’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWECircular Security Separations for Arbitrary Length Cycles from LWEProgrammable Hash Functions from Lattices: Short Signatures and IBEs with Small Key SizesFully Secure Functional Encryption for Inner Products, from Standard AssumptionsCircuit-ABE from LWE: Unbounded Attributes and Semi-adaptive SecurityLattice-Based Fully Dynamic Multi-key FHE with Short CiphertextsCryptography with Auxiliary Input and Trapdoor from Constant-Noise LPNAttribute-Based Keyword Search from LatticesPAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard ModelConstraining and Watermarking PRFs from Milder AssumptionsImproved Discrete Gaussian and Subgaussian Analysis for Lattice CryptographyAlmost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and MoreIsochronous Gaussian Sampling: From Inception to ImplementationEfficient Post-quantum SNARKs for RSIS and RLWE and Their Applications to PrivacyShort Zero-Knowledge Proof of Knowledge for Lattice-Based CommitmentCOSAC: COmpact and Scalable Arbitrary-Centered Discrete Gaussian Sampling over IntegersEfficient Verifiable Partially-Decryptable Commitments from Lattices and ApplicationsTwo-Round Oblivious Linear Evaluation from Learning with ErrorsTowards a Simpler Lattice Gadget ToolkitRing Trapdoor Redactable Signatures from LatticeClassical Verification of Quantum ComputationsGladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed DecryptionShorter Lattice-Based Group Signatures via “Almost Free” Encryption and Other OptimizationsLattice-based accumulator with constant time list update and constant time verificationFunctional commitments for all functions, with transparent setup and from SISBatch bootstrapping. I: A new framework for SIMD bootstrapping in polynomial modulusBatch bootstrapping. II: Bootstrapping in polynomial modulus only requires \(\tilde{O}(1)\) FHE multiplications in amortizationSuccinct vector, polynomial, and functional commitments from latticesEfficient laconic cryptography from learning with errorsSender-binding key encapsulationPrivately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomnessQuantum commitments and signatures without one-way functionsLattice-based zero-knowledge proofs and applications: shorter, simpler, and more generalLattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable (extended abstract)Shorter hash-and-sign lattice-based signaturesMuSig-L: lattice-based multi-signature with single-round online phaseA new framework for more efficient round-optimal lattice-based (partially) blind signature via trapdoor samplingAchieving Almost-Full Security for Lattice-Based Fully Dynamic Group Signatures with Verifier-Local RevocationFiat-Shamir signatures based on module-NTRURelaxed Lattice-Based Signatures with Short Zero-Knowledge ProofsVerifiable Decryption for Fully Homomorphic EncryptionLattice-based signatures with tight adaptive corruptions and moreEfficient lattice-based blind signatures via Gaussian one-time signaturesMulti-authority ABE from lattices without random oraclesABE for circuits with constant-size secret keys and adaptive securityRevocable identity-based fully homomorphic signature scheme with signing key exposure resistanceFully collusion resistant trace-and-revoke functional encryption for arbitrary identitiesTriply adaptive UC NIZKMulti-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrappingIdentity-based interactive aggregate signatures from latticesPreimage sampling in the higher-bit approximate setting with a non-spherical Gaussian samplerNew and improved constructions for partially equivocable public key encryptionCumulatively all-lossy-but-one trapdoor functions from standard assumptions(Inner-product) functional encryption with updatable ciphertextsLattice signature with efficient protocols, application to anonymous credentialsA framework for practical anonymous credentials from latticesA fully secure lattice-based signcryption with designated equality test in standard modelCandidate witness encryption from lattice techniquesBalanced non-adjacent formsPublic-key watermarking schemes for pseudorandom functionsLeveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with RoundingA New Design of Online/Offline Signatures Based on LatticeA New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusionEntropic hardness of Module-LWE from module-NTRUSimplified server-aided revocable identity-based encryption from latticesSpatial encryption revisited: from delegatable multiple inner product encryption and morePublic key authenticated encryption with keyword search from LWELattice-based programmable hash functions and applicationsQuantum search-to-decision reduction for the LWE problemLattice-based succinct arguments from vanishing polynomials (extended abstract)\textsf{Orbweaver}: succinct linear functional commitments from latticesCompact lattice gadget and its applications to hash-and-sign signaturesError correction and ciphertext quantization in lattice cryptographyAlmost tight multi-user security under adaptive corruptions from LWE in the standard model\textsf{DualMS}: efficient lattice-based two-round multi-signature with trapdoor-free simulationA lower bound for proving hardness of learning with rounding with polynomial modulusTraceable policy-based signatures and instantiation from latticesLattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud EnvironmentCollusion Resistant Traitor Tracing from Learning with ErrorsDeterministic compression with uncertain priorsDrawing Bobbin Lace Graphs, or, Fundamental Cycles for a Subclass of Periodic GraphsDiscrete Gaussian Distributions via Theta FunctionsImproved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and ApplicationsImproved (Hierarchical) Inner-Product Encryption from LatticesPrivate Puncturable PRFs from Standard Lattice AssumptionsConstraint-Hiding Constrained PRFs for NC $$^1$$ from LWEThe truth behind the myth of the folk theoremExpanders with respect to Hadamard spaces and random graphsLimits of local algorithms over sparse random graphsWatermarking cryptographic functionalities from standard lattice assumptionsMulti-theorem preprocessing NIZKs from latticesGeneric constructions of integrated PKE and PEKSTighter security proofs for GPV-IBE in the quantum random oracle modelVerifying quantum computations at scale: A cryptographic leash on quantum devicesTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesA Novel Lattice-Based Ciphertext-Policy Attribute-Based Proxy Re-encryption for Cloud SharingAdaptively secure MPC with sublinear communication complexityClassical Homomorphic Encryption for Quantum CircuitsA time-distance trade-off for GDD with preprocessing: instantiating the DLW heuristicMulti-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input SettingTowards Round-Optimal Secure Multiparty Computations: Multikey FHE Without a CRSLattice-based revocable (hierarchical) IBE with decryption key exposure resistanceHomomorphic EncryptionSeparating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors AssumptionCryptanalyses of Candidate Branching Program ObfuscatorsHardness of (M)LWE with semi-uniform seedsLattice-based key exchange on small integer solution problemA constant-time sampling algorithm for binary Gaussian distribution over the integersSoK: how (not) to design and implement post-quantum cryptographyOn the hardness of module-LWE with binary secretCounterexamples to new circular security assumptions underlying iOSO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions(In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear mapsObfuscating finite automataAttribute-based signatures from lattices: unbounded attributes and semi-adaptive securityTwo-message statistically sender-private OT from LWEAdaptively secure distributed PRFs from LWEDoes Fiat-Shamir require a cryptographic hash function?Policy-based signature scheme from latticesUniversal product learning with errors: a new variant of \textsf{LWE} for lattice-based cryptographyTightly secure signatures from lossy identification schemesAttribute-based access control for inner product functional encryption from LWEReview of cryptographic schemes applied to remote electronic voting systems: remaining challenges and the upcoming post-quantum paradigmAttribute-based conditional proxy re-encryption in the standard model under LWELattice-based HRA-secure attribute-based proxy re-encryption in standard modelOn the higher-bit version of approximate inhomogeneous short integer solution problemSurvey of information securityGadget-based iNTRU lattice trapdoorsMemory lower bounds of reductions revisitedFaster Gaussian sampling for trapdoor lattices with arbitrary modulusPuncturable identity-based and attribute-based encryption from latticesLattice-based public-key encryption with equality test supporting flexible authorization in standard modelA Ring-LWE-based digital signature inspired by Lindner-Peikert schemeAttribute-based proxy re-encryption from standard latticesScalable revocable identity-based signature over lattices in the standard modelDuplication free public keys based on SIS-type problemsLattice trapdoors and IBE from middle-product LWEMatrix PRFs: constructions, attacks, and applications to obfuscationCompressible FHE with applications to PIRFinding shortest lattice vectors faster using quantum searchA generic construction of tightly secure signatures in the multi-user settingHardness of \(k\)-LWE and applications in traitor tracingOn the asymptotic complexity of solving LWELoop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signaturesZero-knowledge arguments for matrix-vector relations and lattice-based group encryptionRevocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and moreLattice-based completely non-malleable public-key encryption in the standard modelPublic key compression for constrained linear signature schemesTrapdoor delegation and HIBE from middle-product LWE in standard modelExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationStrongly secure authenticated key exchange from factoring, codes, and latticesEfficient public-key encryption with equality test from latticesCPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPNA lattice-based group signature scheme with verifier-local revocationA multi-key SMC protocol and multi-key FHE based on some-are-errorless LWEA more efficient leveled strongly-unforgeable fully homomorphic signature schemeOn the structure of Boolean functions with small spectral normDiscretisation and product distributions in ring-LWECollusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard modelLattice-based unidirectional infinite-use proxy re-signatures with private re-signature keyA lattice-based signcryption scheme without random oraclesAdaptively secure distributed PRFs from \(\mathsf{LWE}\)Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymitySampling from discrete Gaussians for lattice-based cryptography on a constrained deviceRevocable attribute-based proxy re-encryptionCCA-security from adaptive all-but-one lossy trapdoor functionsTFHE: fast fully homomorphic encryption over the torusOptimal broadcast encryption from pairings and LWEIndistinguishability obfuscation without maps: attacks and fixes for noisy linear FEKey recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU latticesDecentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}New lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertextsMultiparty reusable non-interactive secure computation from LWEUnbounded multi-party computation from learning with errorsCandidate obfuscation via oblivious LWE samplingWorst case short lattice vector enumeration on block reduced bases of arbitrary blocksizesCryptanalysis of a rank-based signature with short public keysExact lattice sampling from non-Gaussian distributionsEfficient adaptively-secure IB-KEMs and VRFs via near-collision resistanceNon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsRound-optimal verifiable oblivious pseudorandom functions from ideal latticesIdentity-based encryption with security against the KGC: a formal model and its instantiationsQuantum-resistant identity-based signature with message recovery and proxy delegationLWE from non-commutative group ringsChosen-ciphertext lattice-based public key encryption with equality test in standard modelWhy you cannot even hope to use Gröbner bases in cryptography: an eternal golden braid of failuresA new Gaussian sampling for trapdoor lattices with arbitrary modulusTightly secure signature schemes from the LWE and subset sum assumptionsLattice-based revocable certificateless signatureStrongly unforgeable ring signature scheme from lattices in the standard modelIncompressible encodingsAdaptively secure constrained pseudorandom functions in the standard modelRounding in the ringsAn optimized GHV-type HE scheme: simpler, faster, and more versatileProgressive and efficient verification for digital signaturesRevocable hierarchical attribute-based signatures from latticesWorst-case to average-case reductions for module latticesPassword protected secret sharing from latticesEfficient homomorphic conversion between (ring) LWE ciphertextsImplementation of lattice trapdoors on modules and applicationsGenerating cryptographically-strong random lattice bases and recognizing rotations of \(\mathbb{Z}^n\)Short identity-based signatures with tight security from latticesSecure hybrid encryption in the standard model from hard learning problemsHardness of LWE on general entropic distributionsKey-homomorphic pseudorandom functions from LWE with small modulusIntegral matrix Gram root and lattice Gaussian sampling without floats


Uses Software



This page was built for publication: Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller