Better Key Sizes (and Attacks) for LWE-Based Encryption

From MaRDI portal
Publication:3073715

DOI10.1007/978-3-642-19074-2_21zbMath1284.94088OpenAlexW2106970188MaRDI QIDQ3073715

Richard Lindner, Chris Peikert

Publication date: 11 February 2011

Published in: Topics in Cryptology – CT-RSA 2011 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-19074-2_21




Related Items (94)

Lattice-based key exchange on small integer solution problemDual lattice attacks for closest vector problems (with preprocessing)Decryption Failure Is More Likely After SuccessPolly cracker, revisitedTowards post-quantum security for signal's X3DH handshakeHomomorphic Encryption StandardLattice-based certificateless encryption schemeAn efficient CCA-secure cryptosystem over ideal lattices from identity-based encryptionHomomorphic AES evaluation using the modified LTV schemeAnalyzing the Shuffling Side-Channel Countermeasure for Lattice-Based SignaturesSieving for Shortest Vectors in Lattices Using Angular Locality-Sensitive HashingCoded-BKW: Solving LWE Using Lattice CodesAn Improved BKW Algorithm for LWE with Applications to Cryptography and LatticesProvably Weak Instances of Ring-LWEFaster homomorphic encryption over GPGPUs via hierarchical DGTAttribute-based conditional proxy re-encryption in the standard model under LWEOn the higher-bit version of approximate inhomogeneous short integer solution problemMaking the BKW algorithm practical for LWEOn a dual/hybrid approach to small secret LWE. A dual/enumeration technique for learning with errors and application to security estimates of FHE schemesSecurity of public key encryption against resetting attacksFiat-Shamir and correlation intractability from strong KDM-secure encryptionOn the Efficacy of Solving LWE by Reduction to Unique-SVPSecure Statistical Analysis Using RLWE-Based Homomorphic EncryptionVandermonde meets Regev: public key encryption schemes based on partial Vandermonde problemsTightly secure ring-LWE based key encapsulation with short ciphertextsA Ring-LWE-based digital signature inspired by Lindner-Peikert schemeThe polynomial learning with errors problem and the smearing condition\(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryptionAnonymous, robust post-quantum public key encryptionFaster Sieving for Shortest Lattice Vectors Using Spherical Locality-Sensitive HashingFHEW with Efficient Multibit BootstrappingHigh-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega MicrocontrollersEfficient Integer Encoding for Homomorphic Encryption via Ring IsomorphismsLattice Point Enumeration on Block Reduced BasesAdaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption SchemesPredicting the concrete security of LWE against the dual attack using binary searchA detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attackEstimation of the hardness of the learning with errors problem with a restricted number of samplesAugmented Learning with Errors: The Untapped Potential of the Error TermSecret computation of purchase history data using somewhat homomorphic encryptionFaster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALSOn the hardness of module learning with errors with short distributionsGeneralized attack on ECDSA: known bits in arbitrary positionsNew techniques for SIDH-based NIKECryptanalysis of a round optimal lattice-based multisignature schemeSolving LWR via BDD Strategy: Modulus Switching ApproachRevisiting the Sparsification Technique in Kannan’s Embedding Attack on LWEOn the asymptotic complexity of solving LWELogarithmic-size (linkable) threshold ring signatures in the plain modelFaster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 SecondsPreimage sampling in the higher-bit approximate setting with a non-spherical Gaussian samplerMyOPE: malicious security for oblivious polynomial evaluationFault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidatesPost-quantum key exchange for the Internet and the open quantum safe projectSecure Implementation of Lattice-Based Encryption SchemesLattice-based cryptography: a surveyConcrete security from worst-case to average-case lattice reductionsFinding and evaluating parameters for BGVScalable ciphertext compression techniques for post-quantum KEMs and their applicationsEstimating quantum speedups for lattice sievesSecret handshakes: full dynamicity, deniability and lattice-based designGauss Sieve Algorithm on GPUsProvably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum WorldMulti-bit Leveled Homomorphic Encryption via $$\mathsf {Dual.LWE}$$ -BasedA Practical Post-Quantum Public-Key Cryptosystem Based on $$\textsf {spLWE}$$Analysis of error-correcting codes for lattice-based key exchangeUnnamed ItemAn Experimental Study of Kannan’s Embedding Technique for the Search LWE ProblemHILA5: on reliability, reconciliation, and error correction for Ring LWE encryptionA public-key encryption scheme based on non-linear indeterminate equationsThe polynomial approximate common divisor problem and its application to the fully homomorphic encryptionOn the complexity of the BKW algorithm on LWELP Solutions of Vectorial Integer Subset Sums – Cryptanalysis of Galbraith’s Binary Matrix LWERandom Sampling Revisited: Lattice Enumeration with Discrete PruningOn Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEALEnhancing Goldreich, Goldwasser and Halevi's scheme with intersecting latticesGroup signatures and more from isogenies and lattices: generic, simple, and efficientUnnamed ItemPost-Quantum Forward-Secure Onion RoutingOnion ORAM: A Constant Bandwidth Blowup Oblivious RAMPost-Quantum Cryptography: State of the ArtLattice-based identity-based resplittable threshold public key encryption schemeSampling from discrete Gaussians for lattice-based cryptography on a constrained deviceTweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizesThe Geometry of Lattice CryptographyOn Quantum Chosen-Ciphertext Attacks and Learning with ErrorsParallel Implementation of BDD Enumeration for LWEHow (Not) to Instantiate Ring-LWESemantic Security and Indistinguishability in the Quantum WorldLWE from non-commutative group ringsLWE with side information: attacks and concrete security estimationAn optimized GHV-type HE scheme: simpler, faster, and more versatileRevocable hierarchical identity-based authenticated key exchangeLattice-Based SNARGs and Their Application to More Efficient Obfuscation


Uses Software


Cites Work


This page was built for publication: Better Key Sizes (and Attacks) for LWE-Based Encryption