On Ideal Lattices and Learning with Errors over Rings

From MaRDI portal
Publication:3563827

DOI10.1007/978-3-642-13190-5_1zbMath1279.94099OpenAlexW2098290658WikidataQ57484385 ScholiaQ57484385MaRDI QIDQ3563827

Vadim Lyubashevsky, Chris Peikert, Oded Regev

Publication date: 1 June 2010

Published in: Advances in Cryptology – EUROCRYPT 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-13190-5_1




Related Items (only showing first 100 items - show all)

Structural cryptanalysis of McEliece schemes with compact keysSoK: how (not) to design and implement post-quantum cryptographyOn the hardness of module-LWE with binary secretHow to meet ternary LWE keysLower bounds on lattice sieving and information set decodingA trace map attack against special ring-LWE samplesFFT program generation for ring LWE-based cryptographyPolly cracker, revisitedCryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reductionSuccinct non-interactive arguments via linear interactive proofsAn efficient CCA-secure cryptosystem over ideal lattices from identity-based encryptionLWE without modular reduction and improved side-channel attacks against BLISSError analysis of weak poly-LWE instancesHomomorphic AES evaluation using the modified LTV schemeUniversal product learning with errors: a new variant of \textsf{LWE} for lattice-based cryptographyImproved attacks against key reuse in learning with errors key exchangeReview of cryptographic schemes applied to remote electronic voting systems: remaining challenges and the upcoming post-quantum paradigmAn extension of Kannan's embedding for solving ring-based LWE problemsWhen HEAAN meets FV: a new somewhat homomorphic encryption with reduced memory overheadThe matrix reloaded: multiplication strategies in FrodoKEMOn the higher-bit version of approximate inhomogeneous short integer solution problemSurvey of information securityGadget-based iNTRU lattice trapdoorsAdaptively secure laconic function evaluation for \(\mathsf{NC}^1\)Memory lower bounds of reductions revisitedShort, invertible elements in partially splitting cyclotomic rings and applications to lattice-based zero-knowledge proofsApplication of automorphic forms to lattice problemsNon-commutative ring learning with errors from cyclic algebrasVandermonde meets Regev: public key encryption schemes based on partial Vandermonde problemsUnified program generation and verification: a case study on number-theoretic transformLattice-based public-key encryption with equality test supporting flexible authorization in standard modelTightly secure ring-LWE based key encapsulation with short ciphertextsA Ring-LWE-based digital signature inspired by Lindner-Peikert schemeThe polynomial learning with errors problem and the smearing conditionAsymptotically quasi-optimal cryptographyLimits of polynomial packings for \(\mathbb{Z}_{p^k}\) and \(\mathbb{F}_{p^k}\)Anonymity of NIST PQC round 3 KEMsLattice trapdoors and IBE from middle-product LWEAsymptotically efficient lattice-based digital signaturesBonsai trees, or how to delegate a lattice basisComparison analysis of Ding's RLWE-based key exchange protocol and NewHope variantsSecret computation of purchase history data using somewhat homomorphic encryptionEfficiently processing complex-valued data in homomorphic encryptionFlattening NTRU for evaluation key free homomorphic encryptionThe closest vector problem in tensored root lattices of type A and in their dualsD-NTRU: more efficient and average-case IND-CPA secure NTRU variantEfficient authentication from hard learning problemsPost-quantum key exchange for the Internet and the open quantum safe projectAn efficient quantum somewhat homomorphic symmetric searchable encryptionSecurity estimates of a ring-LWE symmetric cryptosystem against chosen plaintext attackAssessing the feasibility of single trace power analysis of FrodoAnalysis of error-correcting codes for lattice-based key exchangeProvably secure NTRUEncrypt over any cyclotomic fieldTrapdoor delegation and HIBE from middle-product LWE in standard modelThe lattice-based digital signature scheme qTESLAETRU: NTRU over the Eisenstein integersExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationStrongly secure authenticated key exchange from factoring, codes, and latticesFunctional encryption for cubic polynomials and implementationEfficient reductions in cyclotomic rings -- application to Ring LWE based FHE schemesHILA5: on reliability, reconciliation, and error correction for Ring LWE encryptionA simple provably secure AKE from the LWE problem(Leveled) Fully Homomorphic Encryption without BootstrappingCHIMERA: combining ring-LWE-based fully homomorphic encryption schemesA framework for cryptographic problems from linear algebraTowards isogeny-based password-authenticated key establishmentDiscretisation and product distributions in ring-LWE(In)security of ring-LWE under partial key exposureOn the condition number of the Vandermonde matrix of the \(n\)th cyclotomic polynomialIdeal forms of Coppersmith's theorem and Guruswami-Sudan list decodingSampling from discrete Gaussians for lattice-based cryptography on a constrained deviceLimits on the efficiency of (ring) LWE-based non-interactive key exchangeTFHE: fast fully homomorphic encryption over the torus(One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemesTweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizesOn the ideal shortest vector problem over random rational primesOn the integer polynomial learning with errors problemRound-optimal verifiable oblivious pseudorandom functions from ideal latticesLWE from non-commutative group ringsChosen-ciphertext lattice-based public key encryption with equality test in standard modelA new scale-invariant homomorphic encryption schemeTightly secure signature schemes from the LWE and subset sum assumptionsLattice-based revocable certificateless signaturePractical \(\mathsf{MP} \text{- }\mathsf{LWE}\)-based encryption balancing security-risk versus efficiencyStrongly leakage resilient authenticated key exchange, revisitedHardness of learning problems over Burnside groups of exponent 3Fast reduction of algebraic lattices over cyclotomic fieldsLattice reduction for modules, or how to reduce ModuleSVP to ModuleSVPRounding in the ringsA non-PCP approach to succinct quantum-safe zero-knowledgePractical product proofs for lattice commitmentsRevocable hierarchical attribute-based signatures from latticesBootstrapping for approximate homomorphic encryption with negligible failure-probability by using sparse-secret encapsulationEfficient and tight oblivious transfer from PKE with tight multi-user securityDistinguishing attack on the NTRUCipher encryption schemeRevocable hierarchical identity-based authenticated key exchangeWorst-case to average-case reductions for module latticesEfficient homomorphic conversion between (ring) LWE ciphertextsQuantum key search for ternary LWEImplementation of lattice trapdoors on modules and applications




This page was built for publication: On Ideal Lattices and Learning with Errors over Rings