Lattice-based Cryptography

From MaRDI portal
Publication:3613268

DOI10.1007/978-3-540-88702-7_5zbMath1161.81324OpenAlexW1598269861MaRDI QIDQ3613268

Daniele Micciancio, Oded Regev

Publication date: 12 March 2009

Published in: Post-Quantum Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-88702-7_5




Related Items (89)

Lattice-based key exchange on small integer solution problemEfficient Post-quantum SNARKs for RSIS and RLWE and Their Applications to PrivacyShort Zero-Knowledge Proof of Knowledge for Lattice-Based CommitmentA compressed \(\varSigma \)-protocol theory for latticesA trace map attack against special ring-LWE samplesPolly cracker, revisitedHomomorphic Encryption StandardHomomorphic AES evaluation using the modified LTV schemeQuantum Homomorphic Encryption for Circuits of Low T-gate ComplexityCoded-BKW: Solving LWE Using Lattice CodesProvably Weak Instances of Ring-LWECryptanalysis of the Co-ACD AssumptionSolving the search-LWE problem over projected latticesAn extension of Kannan's embedding for solving ring-based LWE problemsFiat-Shamir and correlation intractability from strong KDM-secure encryptionOn the Efficacy of Solving LWE by Reduction to Unique-SVPVandermonde meets Regev: public key encryption schemes based on partial Vandermonde problemsTightly secure ring-LWE based key encapsulation with short ciphertextsA Ring-LWE-based digital signature inspired by Lindner-Peikert schemeThe polynomial learning with errors problem and the smearing conditionLattices from codes over \(\mathbb {Z}_q\): generalization of constructions \(D\), \(D'\) and \(\overline{D}\)A Fast Phase-based Enumeration Algorithm for SVP Challenge Through $$y$$-Sparse Representations of Short Lattice VectorsProperties of constacyclic codes under the Schur productEfficient Integer Encoding for Homomorphic Encryption via Ring IsomorphismsSharper bounds on four lattice constantsCryptanalysis of the CLR-cryptosystemPredicting the concrete security of LWE against the dual attack using binary searchEstimation of the hardness of the learning with errors problem with a restricted number of samplesPotLLL: a polynomial time version of LLL with deep insertionsFaster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALSGeneralized attack on ECDSA: known bits in arbitrary positionsHardness of \(k\)-LWE and applications in traitor tracingDigital Signatures Based on the Hardness of Ideal Lattice Problems in All RingsPreventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption SchemeThe linear transformation that relates the canonical and coefficient embeddings of ideals in cyclotomic integer ringsEHNP strikes back: analyzing SM2 implementationsSolving LWR via BDD Strategy: Modulus Switching ApproachHandle the traces: revisiting the attack on ECDSA with EHNPA bivariate polynomial-based cryptographic hard problem and its applicationsA closest vector problem arising in radiation therapy planningOn the asymptotic complexity of solving LWEThe Efficiency of Embedding-Based Attacks on the GGH Lattice-Based CryptosystemFast practical lattice reduction through iterated compressionDoes the dual-sieve attack on learning with errors even work?Statistical-computational trade-offs in tensor PCA and related problems via communication complexityA New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusionLattice-Based Proof of a ShuffleConcrete security from worst-case to average-case lattice reductionsFinding and evaluating parameters for BGVOn elliptic curve $L$-functions integrated encryption schemeAttacks on the Search RLWE Problem with Small ErrorsEstimating quantum speedups for lattice sievesTuple lattice sievingImproved combinatorial algorithms for the inhomogeneous short integer solution problemQuantum Cryptography: Key Distribution and BeyondPublic key compression for constrained linear signature schemesUnnamed ItemAn Experimental Study of Kannan’s Embedding Technique for the Search LWE ProblemFractional LWE: A Nonlinear Variant of LWEParameterized Intractability of Even Set and Shortest Vector Problem from Gap-ETHAlgorithms for the Shortest and Closest Lattice Vector ProblemsA Signcryption Scheme Based Learning with Errors over Rings Without TrapdoorNew Algorithms for Learning in Presence of ErrorsA lattice-based group signature scheme with verifier-local revocationThe polynomial approximate common divisor problem and its application to the fully homomorphic encryptionBounds for the \(l_1\)-distance of \(q\)-ary lattices obtained via constructions \(\mathrm D\), \(\mathrm D'\) and \(\overline{\mathrm D}\)Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distanceImproved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and ApplicationsOn the complexity of the BKW algorithm on LWEGenerating shorter bases for hard random latticesOn Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEALUnnamed ItemRigorous and Efficient Short Lattice Vectors EnumerationFinding Shortest Lattice Vectors in the Presence of GapsImproved attacks on knapsack problem with their variants and a knapsack type ID-schemePost-Quantum Forward-Secure Onion RoutingImprovements in the analysis of Kannan's CVP algorithmBetter Key Sizes (and Attacks) for LWE-Based EncryptionInteger Version of Ring-LWE and Its ApplicationsLearning a parallelepiped: Cryptanalysis of GGH and NTRU signaturesOn bounded distance decoding with predicate: breaking the ``lattice barrier for the hidden number problemAdvanced lattice sieving on GPUs, with tensor coresThe Geometry of Lattice CryptographyOn the success probability of solving unique SVP via BKZThe Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEsHow (Not) to Instantiate Ring-LWEWorst-case to average-case reductions for module latticesDeciding Orthogonality in Construction-A LatticesThe remote set problem on lattices




This page was built for publication: Lattice-based Cryptography