Separating semantic and circular security for symmetric-key bit encryption from the learning with errors assumption
From MaRDI portal
Publication:5267417
DOI10.1007/978-3-319-56614-6_18zbMATH Open1415.94432OpenAlexW2592059199MaRDI QIDQ5267417FDOQ5267417
Authors: Rishab Goyal, Venkata Koppula, Brent Waters
Publication date: 13 June 2017
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-56614-6_18
Recommendations
- Circular Security Separations for Arbitrary Length Cycles from LWE
- On the circular security of bit-encryption
- Toward fine-grained blackbox separations between semantic and circular-security notions
- Separations in circular security for arbitrary length key cycles
- New circular security counterexamples from decision linear and learning with errors
Cites Work
- Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
- Fully homomorphic encryption using ideal lattices
- Public-key cryptosystems from the worst-case shortest vector problem
- On lattices, learning with errors, random linear codes, and cryptography
- Trapdoors for hard lattices and new cryptographic constructions
- Classical hardness of learning with errors
- Worst‐Case to Average‐Case Reductions Based on Gaussian Measures
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Circular-Secure Encryption from Decision Diffie-Hellman
- Bounded-width polynomial-size branching programs recognize exactly those languages in \(NC^ 1\)
- Bounds for Width Two Branching Programs
- Title not available (Why is that?)
- Trapdoors for lattices: simpler, tighter, faster, smaller
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Advances in Cryptology - EUROCRYPT 2004
- Pseudorandom functions and lattices
- Cryptanalysis of the multilinear map over the integers
- Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations
- On the circular security of bit-encryption
- Black-box circular-secure encryption beyond affine functions
- Cryptographic agility and its relation to circular encryption
- Bounded key-dependent message security
- A decade of lattice cryptography
- Key-dependent message security: generic amplification and completeness
- Graph-induced multilinear maps from lattices
- Circular and KDM security for identity-based encryption
- Separations in circular security for arbitrary length key cycles
- Obfuscation \(\Rightarrow\) (IND-CPA security \(\nRightarrow\) circular security)
- New definitions and separations for circular security
- New circular security counterexamples from decision linear and learning with errors
- Circular Security Separations for Arbitrary Length Cycles from LWE
- Bounded KDM security from iO and OWF
- Three’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE
Cited In (13)
- KDM security for identity-based encryption: constructions and separations
- Universal amplification of KDM security: from 1-key circular to multi-key KDM
- On the circular security of bit-encryption
- New circular security counterexamples from decision linear and learning with errors
- Toward fine-grained blackbox separations between semantic and circular-security notions
- Return of GGH15: provable security against zeroizing attacks
- Counterexamples to new circular security assumptions underlying iO
- Lockable obfuscation from circularly insecure fully homomorphic encryption
- Collusion resistant traitor tracing from learning with errors
- On the security of the multivariate ring learning with errors problem
- Improved attacks against key reuse in learning with errors key exchange
- SoK: learning with errors, circular security, and fully homomorphic encryption
- Circular security is complete for KDM security
This page was built for publication: Separating semantic and circular security for symmetric-key bit encryption from the learning with errors assumption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5267417)