New Algorithms for Learning in Presence of Errors

From MaRDI portal
Publication:3012822

DOI10.1007/978-3-642-22006-7_34zbMath1332.68099OpenAlexW1760474993MaRDI QIDQ3012822

Sanjeev Arora, Rong Ge

Publication date: 6 July 2011

Published in: Automata, Languages and Programming (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-22006-7_34




Related Items (54)

On solving LPN using BKW and variants, Implementation and analysisThe Cryptographic Power of Random SelectionShortest vectors in lattices of Bai-Galbraith's embedding attack on the LWR problemCryptography from Learning Parity with NoisePolly cracker, revisitedHomomorphic Encryption StandardLow-complexity weak pseudorandom functions in \(\mathtt{AC}0[\mathtt{MOD}2\)] ⋮ A dichotomy for local small-bias generatorsCoded-BKW: Solving LWE Using Lattice CodesAn Improved BKW Algorithm for LWE with Applications to Cryptography and LatticesMaking the BKW algorithm practical for LWEFiat-Shamir and correlation intractability from strong KDM-secure encryptionOn the Efficacy of Solving LWE by Reduction to Unique-SVPA Ring-LWE-based digital signature inspired by Lindner-Peikert scheme\(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryptionQuantum algorithms for variants of average-case lattice problems via filteringCompressible FHE with applications to PIRPredicting the concrete security of LWE against the dual attack using binary searchEstimation of the hardness of the learning with errors problem with a restricted number of samplesFaster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALSOn the hardness of module learning with errors with short distributionsA new algebraic approach to the regular syndrome decoding problem and implications for PCG constructionsEfficient FHEW bootstrapping with small evaluation keys, and applications to threshold homomorphic encryptionSolving LWR via BDD Strategy: Modulus Switching ApproachA polynomial time algorithm for breaking NTRU encryption with multiple keysOn the asymptotic complexity of solving LWEHomomorphic encryption: a mathematical surveyNon-interactive secure computation of inner-product from LPN and LWEOblivious transfer with constant computational overheadCorrelated pseudorandomness from expand-accumulate codesMoz\(\mathbb{Z}_{2^k}\)arella: efficient vector-OLE and zero-knowledge proofs over \(\mathbb{Z}_{2^k}\)Correlated pseudorandomness from the hardness of quasi-abelian decodingAttacks on the Search RLWE Problem with Small ErrorsBKW meets Fourier new algorithms for LPN with sparse paritiesA Practical Post-Quantum Public-Key Cryptosystem Based on $$\textsf {spLWE}$$NTRU prime: reducing attack surface at low costOn the complexity of the BKW algorithm on LWEOn Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEALFinding Correlations in Subquadratic Time, with Applications to Learning Parities and the Closest Pair ProblemSampling from discrete Gaussians for lattice-based cryptography on a constrained deviceHomomorphic Evaluation of Lattice-Based Symmetric Encryption SchemesVerifiable single-server private information retrieval from LWE with binary errorsMPSign: a signature from small-secret middle-product learning with errorsIndistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplificationParallel Implementation of BDD Enumeration for LWEGeneralized Learning Problems and Applications to Non-commutative CryptographyOn the success probability of solving unique SVP via BKZHow (Not) to Instantiate Ring-LWETowards Sound Fresh Re-keying with Hard (Physical) Learning ProblemsUnnamed ItemQuantum Hardness of Learning Shallow Classical CircuitsHardness of learning problems over Burnside groups of exponent 3Pseudorandom Functions: Three Decades LaterHomomorphic Encryption



Cites Work


This page was built for publication: New Algorithms for Learning in Presence of Errors