Efficient Identity-Based Encryption over NTRU Lattices

From MaRDI portal
Publication:2936597

DOI10.1007/978-3-662-45608-8_2zbMath1317.94103OpenAlexW62933689MaRDI QIDQ2936597

Léo Ducas, Vadim Lyubashevsky, Thomas Prest

Publication date: 6 January 2015

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-45608-8_2




Related Items (45)

SoK: how (not) to design and implement post-quantum cryptographyImproved Discrete Gaussian and Subgaussian Analysis for Lattice CryptographyIsochronous Gaussian Sampling: From Inception to ImplementationCompact Privacy Protocols from Post-quantum and Timed Classical AssumptionsCOSAC: COmpact and Scalable Arbitrary-Centered Discrete Gaussian Sampling over IntegersSurvey of information securityGadget-based iNTRU lattice trapdoors\textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon}Scalable revocable identity-based signature over lattices in the standard modelTowards a Simpler Lattice Gadget ToolkitHigh-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega MicrocontrollersA Novel Certificateless Multi-signature Scheme over NTRU LatticesA novel identity-based multi-signature scheme over NTRU latticesLMCLAEKS: LWE-assisted multi-recipient certificateless authenticated encryption with keyword searchImproved power analysis attacks on FalconPartitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear MapsShorter hash-and-sign lattice-based signaturesFiat-Shamir signatures based on module-NTRUA polynomial time algorithm for breaking NTRU encryption with multiple keysBLOOM: bimodal lattice one-out-of-many proofs and applicationsD-NTRU: more efficient and average-case IND-CPA secure NTRU variantA framework for practical anonymous credentials from latticesLattice-based inner product argumentLoop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signaturesLattice-based programmable hash functions and applicationsA full RNS variant of FV like somewhat homomorphic encryption schemesLattice-based cryptography: a surveyCompact lattice gadget and its applications to hash-and-sign signaturesCCA-secure (puncturable) KEMs from encryption with non-negligible decryption errorsIdentity-Based Blind Signature from Lattices in Standard ModelProvably secure NTRUEncrypt over any cyclotomic fieldProvably Secure NTRU Instances over Prime Cyclotomic RingsRevisiting Lattice Attacks on Overstretched NTRU ParametersOne-Shot Verifiable Encryption from LatticesA framework for cryptographic problems from linear algebraModular lattice signatures, revisitedKey recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU latticesThe Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEsProgrammable Hash Functions from Lattices: Short Signatures and IBEs with Small Key SizesAlgorithms for the Generalized NTRU Equations and their Storage AnalysisLattice-based revocable certificateless signatureUnnamed ItemA non-PCP approach to succinct quantum-safe zero-knowledgeImplementation of lattice trapdoors on modules and applicationsIntegral matrix Gram root and lattice Gaussian sampling without floats




This page was built for publication: Efficient Identity-Based Encryption over NTRU Lattices