Public-key cryptosystems from the worst-case shortest vector problem

From MaRDI portal
Publication:5172727

DOI10.1145/1536414.1536461zbMath1304.94079OpenAlexW2058785578WikidataQ57484381 ScholiaQ57484381MaRDI QIDQ5172727

Chris Peikert

Publication date: 4 February 2015

Published in: Proceedings of the forty-first annual ACM symposium on Theory of computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/1536414.1536461




Related Items

Limits on the Efficiency of (Ring) LWE Based Non-interactive Key ExchangeConstraining and Watermarking PRFs from Milder AssumptionsAlmost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and MoreCompact Lossy and All-but-One Trapdoor Functions from LatticeFast Discretized Gaussian Sampling and Post-quantum TLS CiphersuiteFully Homomorphic Encryption with Auxiliary InputsApproximate-Deterministic Public Key Encryption from Hard Learning ProblemsMulti-key FHE from LWE, RevisitedTargeted Homomorphic Attribute-Based EncryptionLattice-Based Group Encryption with Full Dynamicity and Message Filtering PolicyFaster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALSRinocchio: SNARKs for ring arithmeticBreaking the \(O(\sqrt{n})\)-bit barrier: Byzantine agreement with polylog bits per partyPrivately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomnessZero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoorsClassical reduction of gap SVP to LWE: a concrete security analysisLattice-based signatures with tight adaptive corruptions and moremrNISC from LWE with polynomial modulusFully collusion resistant trace-and-revoke functional encryption for arbitrary identitiesmrNISC from LWE with polynomial modulusSubfield attacks on HSVP in ideal latticesUnnamed ItemOn error distributions in ring-based LWEMulti-bit Leveled Homomorphic Encryption via $$\mathsf {Dual.LWE}$$ -BasedCollusion Resistant Traitor Tracing from Learning with ErrorsDeterministic compression with uncertain priorsLattice-based FHE as secure as PKECryptogenographyLimits of random oracles in secure computationNon-commutative arithmetic circuits with divisionDecision trees, protocols and the entropy-influence conjectureLocally testable codes and cayley graphsInvitation games and the price of stabilityWelfare maximization and truthfulness in mechanism design with ordinal preferencesCoordination mechanisms from (almost) all scheduling policiesPrivate interactive communication across an adversarial channelTree codes and a conjecture on exponential sumsCapacity of non-malleable codesLinear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applicationsAdversarial hypothesis testing and a quantum stein's lemma for restricted measurementsSequential decision making with vector outcomesLearning mixtures of arbitrary distributions over large discrete domainsWhy do simple algorithms for triangle enumeration work in the real world?Black-box obfuscation for d-CNFsCandidate weak pseudorandom functions in AC 0 ○ MOD 2Iterated group products and leakage resilience against NC1Building one-time memories from isolated qubitsAttribute-efficient evolvability of linear functionsEnergy-efficient circuit designRate-independent computation in continuous chemical reaction networksTesters and their applicationsOn the automorphism groups of strongly regular graphs IFaster private release of marginals on small databasesMechanism design in large gamesRedrawing the boundaries on purchasing data from privacy-sensitive individualsApproximation schemes via Sherali-Adams hierarchy for dense constraint satisfaction problems and assignment problemsComplexity of approximating CSP with balance / hard constraintsInteger feasibility of random polytopesMultireference alignment using semidefinite programmingPartial tests, universal tests and decomposabilityHigh dimensional expanders and property testingParameterized testabilityDirect sum fails for zero error average communicationRational argumentsTwo Efficient Tag-Based Encryption Schemes on LatticesBi-homomorphic Lattice-Based PRFs and Unidirectional Updatable EncryptionNew Algorithms for Learning in Presence of ErrorsPacked Ciphertexts in LWE-Based Homomorphic EncryptionImproved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and ApplicationsImproved (Hierarchical) Inner-Product Encryption from LatticesPrivate Puncturable PRFs from Standard Lattice AssumptionsConstraint-Hiding Constrained PRFs for NC $$^1$$ from LWEUnnamed ItemThe truth behind the myth of the folk theoremExpanders with respect to Hadamard spaces and random graphsLimits of local algorithms over sparse random graphsWatermarking cryptographic functionalities from standard lattice assumptionsMulti-theorem preprocessing NIZKs from latticesParallel and concurrent security of the HB and \(HB^{+}\) protocolsTighter security proofs for GPV-IBE in the quantum random oracle modelBetter Key Sizes (and Attacks) for LWE-Based EncryptionInteger Version of Ring-LWE and Its ApplicationsApproximating the Closest Vector Problem Using an Approximate Shortest Vector OracleClassical Homomorphic Encryption for Quantum CircuitsClassical Homomorphic Encryption for Quantum CircuitsThe Geometry of Lattice CryptographyGeneralized Learning Problems and Applications to Non-commutative CryptographyHardness of bounded distance decoding on lattices in lp normsKissing Numbers and Transference Theorems from Generalized Tail BoundsEfficient Threshold Encryption from Lossy Trapdoor FunctionsUnnamed ItemThreshold Decryption and Zero-Knowledge Proofs for Lattice-Based CryptosystemsPublic-Key Encryption Schemes with Auxiliary InputsPublic-Key Cryptographic Primitives Provably as Secure as Subset SumQuantum Hardness of Learning Shallow Classical CircuitsThe Complexity of Public-Key CryptographyPseudorandom Functions: Three Decades LaterHomomorphic EncryptionSeparating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors AssumptionGeneric constructions of master-key KDM secure attribute-based encryptionCandidate witness encryption from lattice techniquesSecuring approximate homomorphic encryption using differential privacyLeveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with RoundingStatistically sender-private OT from LPN and derandomizationForward-secure revocable secret handshakes from latticesQuantum search-to-decision reduction for the LWE problemLattice-based authenticated key exchange with tight securityError correction and ciphertext quantization in lattice cryptographyAlmost tight multi-user security under adaptive corruptions from LWE in the standard modelA lower bound for proving hardness of learning with rounding with polynomial modulusHRA-secure attribute-based threshold proxy re-encryption from latticesHardness of (M)LWE with semi-uniform seedsCompact ring signatures from learning with errorsA black-box approach to post-quantum zero-knowledge in constant roundsLattice-based key exchange on small integer solution problemOn solving LPN using BKW and variants, Implementation and analysisOn the hardness of module-LWE with binary secretLattice reduction with approximate enumeration oracles. Practical algorithms and concrete performanceSmoothing out binary linear codes and worst-case sub-exponential hardness for LPNCryptography from Learning Parity with NoiseTraitor-tracing from LWE made simple and attribute-basedTwo-message statistically sender-private OT from LWELattice-based certificateless encryption schemeAn efficient CCA-secure cryptosystem over ideal lattices from identity-based encryptionUniversal product learning with errors: a new variant of \textsf{LWE} for lattice-based cryptographyAttribute-based conditional proxy re-encryption in the standard model under LWELattice-based HRA-secure attribute-based proxy re-encryption in standard modelSurvey of information securityPuncturable identity-based and attribute-based encryption from latticesToward non-interactive zero-knowledge proofs for NP from LWEAttribute-based proxy re-encryption from standard latticesAlgebraically structured LWE. RevisitedMatrix PRFs: constructions, attacks, and applications to obfuscationA pseudorandom number generator based on worst-case lattice problemsGeneralized approach for analysing quantum key distribution experimentsBonsai trees, or how to delegate a lattice basisEfficient and fully secure lattice-based IBE with equality testComparison analysis of Ding's RLWE-based key exchange protocol and NewHope variantsEstimation of the hardness of the learning with errors problem with a restricted number of samplesAugmented Learning with Errors: The Untapped Potential of the Error TermOn the hardness of module learning with errors with short distributionsHardness of \(k\)-LWE and applications in traitor tracingZero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group EncryptionSignature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice AssumptionsTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionPreventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption SchemeEncoding Functions with Constant Online Rate, or How to Compress Garbled Circuit KeysOn optimizing electricity markets performanceOn the asymptotic complexity of solving LWEComputational fuzzy extractor from LWEImproved broadcast attacks against subset sum problems via lattice oracleImproving convergence and practicality of slide-type reductionsEfficient authentication from hard learning problemsAdaptively secure inner product encryption from LWEMore constructions of lossy and correlation-secure trapdoor functionsFinding collisions in a quantum world: quantum black-box separation of collision-resistance and one-waynessTowards classical hardness of module-LWE: the linear rank caseSuccinct LWE sampling, random polynomials, and obfuscationDirect computation of branching programs and its applications to more efficient lattice-based cryptographyZero-knowledge arguments for matrix-vector relations and lattice-based group encryptionLattice-based proxy-oriented identity-based encryption with keyword search for cloud storageRevocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and moreComputational fuzzy extractorsExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationStrongly secure authenticated key exchange from factoring, codes, and latticesMinimal condition for shortest vectors in lattices of low dimensionNTRU prime: reducing attack surface at low costA lattice-based group signature scheme with verifier-local revocationA simple provably secure AKE from the LWE problemImproved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distanceA multi-key SMC protocol and multi-key FHE based on some-are-errorless LWEGenerating shorter bases for hard random latticesOn the structure of Boolean functions with small spectral norm(Leveled) Fully Homomorphic Encryption without BootstrappingVerifying solutions to LWE with implications for concrete securityFinding Shortest Lattice Vectors in the Presence of GapsPost-Quantum Forward-Secure Onion RoutingCollusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard modelOn the Hardness of Learning with Rounding over Small ModulusCryptographic Assumptions: A Position PaperAdaptive Security with Quasi-Optimal RateDecompositions of Triangle-Dense GraphsFinding Correlations in Subquadratic Time, with Applications to Learning Parities and the Closest Pair ProblemA lattice-based signcryption scheme without random oraclesRevocable attribute-based proxy re-encryptionVerifiable single-server private information retrieval from LWE with binary errorsDecentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}New lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertextsMultiparty reusable non-interactive secure computation from LWEChosen ciphertext attacks secure inner-product functional encryption from learning with errors assumptionA Lattice-Based Group Signature Scheme with Message-Dependent OpeningTuring Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded FunctionsA novel fully homomorphic encryption scheme bsed on LWEIdentity-based encryption with security against the KGC: a formal model and its instantiationsHow (Not) to Instantiate Ring-LWEThree’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWECircular Security Separations for Arbitrary Length Cycles from LWESpooky Encryption and Its ApplicationsCircuit-ABE from LWE: Unbounded Attributes and Semi-adaptive SecurityLWE from non-commutative group ringsLattice-Based Fully Dynamic Multi-key FHE with Short CiphertextsOn the rejection rate of exact sampling algorithm for discrete Gaussian distributions over the integersHardness of learning problems over Burnside groups of exponent 3Incompressible encodingsLattice reduction for modules, or how to reduce ModuleSVP to ModuleSVPSlide reduction, revisited -- filling the gaps in SVP approximationRounding in the ringsAn optimized GHV-type HE scheme: simpler, faster, and more versatileA new post-quantum multivariate polynomial public key encapsulation algorithmWorst-case to average-case reductions for module latticesHardness of LWE on general entropic distributionsKey-homomorphic pseudorandom functions from LWE with small modulus