Better key sizes (and attacks) for LWE-based encryption
From MaRDI portal
Publication:3073715
DOI10.1007/978-3-642-19074-2_21zbMATH Open1284.94088OpenAlexW2106970188MaRDI QIDQ3073715FDOQ3073715
Authors: Richard Lindner, Chris Peikert
Publication date: 11 February 2011
Published in: Topics in Cryptology – CT-RSA 2011 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19074-2_21
Recommendations
- On the concrete hardness of learning with errors
- On the hardness of LWE with binary error: revisiting the hybrid lattice-reduction and meet-in-the-middle attack
- Practical analysis of key recovery attack against search-LWE problem
- On lattices, learning with errors, random linear codes, and cryptography
- On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL
Cites Work
- Title not available (Why is that?)
- Generalized compact knapsacks, cyclic lattices, and efficient one-way functions
- A deterministic single exponential time algorithm for most lattice problems based on Voronoi cell computations
- Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
- On ideal lattices and learning with errors over rings
- Fully homomorphic encryption using ideal lattices
- Public-key cryptosystems from the worst-case shortest vector problem
- A sieve algorithm for the shortest lattice vector problem
- Lattice basis reduction: Improved practical algorithms and solving subset sum problems
- Trapdoors for hard lattices and new cryptographic constructions
- Bonsai trees, or how to delegate a lattice basis
- Efficient lattice (H)IBE in the standard model
- Title not available (Why is that?)
- Title not available (Why is that?)
- A Framework for Efficient and Composable Oblivious Transfer
- Lattice-based Cryptography
- Predicting Lattice Reduction
- On lattices, learning with errors, random linear codes, and cryptography
- New bounds in some transference theorems in the geometry of numbers
- On Lovász' lattice reduction and the nearest lattice point problem
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Noise-tolerant learning, the parity problem, and the statistical query model
- Lossy trapdoor functions and their applications
- Inequalities for convex bodies and polar reciprocal lattices in \(\mathbb{R}^ n\)
- New lattice-based cryptographic constructions
- Lattice enumeration using extreme pruning
- Selecting cryptographic key sizes
- Title not available (Why is that?)
- Public-Key Cryptographic Primitives Provably as Secure as Subset Sum
- An efficient and parallel Gaussian sampler for lattices
- Faster exponential time algorithms for the shortest vector problem
- Title not available (Why is that?)
Cited In (only showing first 100 items - show all)
- Dual lattice attacks for closest vector problems (with preprocessing)
- Solving LWR via BDD Strategy: Modulus Switching Approach
- Sieving for Shortest Vectors in Lattices Using Angular Locality-Sensitive Hashing
- Augmented Learning with Errors: The Untapped Potential of the Error Term
- Analysis of error-correcting codes for lattice-based key exchange
- Revocable hierarchical identity-based authenticated key exchange
- Towards post-quantum security for signal's X3DH handshake
- Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes
- Lattice-based cryptography: a survey
- Lattice-based key exchange on small integer solution problem
- The geometry of lattice cryptography
- On the asymptotic complexity of solving LWE
- Polly cracker, revisited
- Onion ORAM: a constant bandwidth blowup oblivious RAM
- Homomorphic Encryption Standard
- An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption
- HILA5: on reliability, reconciliation, and error correction for Ring LWE encryption
- Enhancing Goldreich, Goldwasser and Halevi's scheme with intersecting lattices
- An improved BKW algorithm for LWE with applications to cryptography and lattices
- How (not) to instantiate ring-LWE
- Random sampling revisited: lattice enumeration with discrete pruning
- Accelerating Lattice Based Proxy Re-encryption Schemes on GPUs
- LWE with side information: attacks and concrete security estimation
- The polynomial approximate common divisor problem and its application to the fully homomorphic encryption
- Efficient integer encoding for homomorphic encryption via ring isomorphisms
- Lattice-based certificateless encryption scheme
- Fiat-Shamir and correlation intractability from strong KDM-secure encryption
- Lattice-based SNARGs and their application to more efficient obfuscation
- STP-LWE: A variant of learning with error for a flexible encryption
- Provably secure password authenticated key exchange based on RLWE for the post-quantum world
- A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack
- New techniques for SIDH-based NIKE
- High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers
- Homomorphic AES evaluation using the modified LTV scheme
- An experimental study of Kannan's embedding technique for the search LWE problem
- Cryptanalysis of a round optimal lattice-based multisignature scheme
- Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing
- Multi-bit leveled homomorphic encryption via dual LWE-based
- Faster homomorphic encryption over GPGPUs via hierarchical DGT
- Attribute-based conditional proxy re-encryption in the standard model under LWE
- On the higher-bit version of approximate inhomogeneous short integer solution problem
- Title not available (Why is that?)
- Anonymous, robust post-quantum public key encryption
- Provably weak instances of Ring-LWE
- Secret computation of purchase history data using somewhat homomorphic encryption
- Faster fully homomorphic encryption: bootstrapping in less than 0.1 seconds
- Gauss sieve algorithm on GPUs
- Sampling from discrete Gaussians for lattice-based cryptography on a constrained device
- Predicting the concrete security of LWE against the dual attack using binary search
- Analyzing the shuffling side-channel countermeasure for lattice-based signatures
- Semantic security and indistinguishability in the quantum world
- On the complexity of the BKW algorithm on LWE
- LP solutions of vectorial integer subset sums -- cryptanalysis of Galbraith's binary matrix LWE
- Scalable ciphertext compression techniques for post-quantum KEMs and their applications
- Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes
- On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL
- A public-key encryption scheme based on non-linear indeterminate equations
- A practical post-quantum public-key cryptosystem based on spLWE
- On Quantum Chosen-Ciphertext Attacks and Learning with Errors
- Improved efficiency of MP12
- Practical analysis of key recovery attack against search-LWE problem
- Estimating key sizes for high dimensional lattice-based systems
- LWE from non-commutative group rings
- FHEW with Efficient Multibit Bootstrapping
- Estimating quantum speedups for lattice sieves
- On the efficacy of solving LWE by reduction to unique-SVP
- Coded-BKW: solving LWE using lattice codes
- Parallel implementation of \textsf{BDD} enumeration for \textsf{LWE}
- Estimation of the hardness of the learning with errors problem with a restricted number of samples
- Cryptanalysis of compact-LWE
- Post-quantum key exchange for the Internet and the open quantum safe project
- Lattice Point Enumeration on Block Reduced Bases
- Secret handshakes: full dynamicity, deniability and lattice-based design
- Practical FHE parameters against lattice attacks
- An optimized GHV-type HE scheme: simpler, faster, and more versatile
- On a dual/hybrid approach to small secret LWE. A dual/enumeration technique for learning with errors and application to security estimates of FHE schemes
- Post-quantum forward-secure onion routing (future anonymity in today's budget)
- Secure statistical analysis using RLWE-based homomorphic encryption
- Generalized attack on ECDSA: known bits in arbitrary positions
- A secure hierarchical deterministic wallet with stealth address from lattices
- Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALS
- Post-quantum cryptography: state of the art
- Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates
- NEV: faster and smaller NTRU encryption using vector decoding
- Logarithmic-size (linkable) threshold ring signatures in the plain model
- Too many hints -- when LLL breaks LWE
- On the concrete security of LWE with small secret
- Decryption failure is more likely after success
- Secure Implementation of Lattice-Based Encryption Schemes
- Concrete security from worst-case to average-case lattice reductions
- Finding and evaluating parameters for BGV
- Zaytun: lattice based PKE and KEM with shorter ciphertext size
- MyOPE: malicious security for oblivious polynomial evaluation
- Making the BKW algorithm practical for LWE
- Security of public key encryption against resetting attacks
- Tightly secure ring-LWE based key encapsulation with short ciphertexts
- Lattice-based identity-based resplittable threshold public key encryption scheme
- Group signatures and more from isogenies and lattices: generic, simple, and efficient
- Vandermonde meets Regev: public key encryption schemes based on partial Vandermonde problems
- A Ring-LWE-based digital signature inspired by Lindner-Peikert scheme
Uses Software
This page was built for publication: Better key sizes (and attacks) for LWE-based encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3073715)