Worst‐Case to Average‐Case Reductions Based on Gaussian Measures

From MaRDI portal
Publication:5454252

DOI10.1137/S0097539705447360zbMath1142.68037OpenAlexW1994790157MaRDI QIDQ5454252

Daniele Micciancio, Oded Regev

Publication date: 28 March 2008

Published in: SIAM Journal on Computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1137/s0097539705447360




Related Items

PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard ModelImproved Discrete Gaussian and Subgaussian Analysis for Lattice CryptographyIsochronous Gaussian Sampling: From Inception to ImplementationNo cutoff for circulants: an elementary proofProvably Weak Instances of Ring-LWEOn ideal lattices, Gröbner bases and generalized hash functionsSampling from Arbitrary Centered Discrete Gaussians for Lattice-Based CryptographyTwo-Round Oblivious Linear Evaluation from Learning with ErrorsA Fast Phase-based Enumeration Algorithm for SVP Challenge Through $$y$$-Sparse Representations of Short Lattice VectorsRing Trapdoor Redactable Signatures from LatticeAugmented Learning with Errors: The Untapped Potential of the Error TermAn Inequality for Gaussians on LatticesFunctional commitments for all functions, with transparent setup and from SISTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionMulti-key Homomorphic AuthenticatorsJust how hard are rotations of \(\mathbb{Z}^n\)? Algorithms and cryptography with the simplest lattice\texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryptionShorter hash-and-sign lattice-based signaturesOn codes and learning with errors over function fieldsFiat-Shamir signatures based on module-NTRUThe gap is sensitive to size of preimages: collapsing property doesn't go beyond quantum collision-resistance for preimages bounded hash functionsPuncturable signature: a generic construction and instantiationsZero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoorsLattice-based signatures with tight adaptive corruptions and moreEfficient lattice-based blind signatures via Gaussian one-time signaturesRevocable identity-based fully homomorphic signature scheme with signing key exposure resistance\textsc{Hawk}: module LIP makes lattice signatures fast, compact and simpleIdentity-based interactive aggregate signatures from latticesPreimage sampling in the higher-bit approximate setting with a non-spherical Gaussian samplerThe state of the union: union-only signatures for data aggregationNon-Black-Box Worst-Case to Average-Case Reductions Within \(\mathsf{NP}\)(Inner-product) functional encryption with updatable ciphertextsLattice signature with efficient protocols, application to anonymous credentialsA framework for practical anonymous credentials from latticesFinding short integer solutions when the modulus is smallGeneric constructions of master-key KDM secure attribute-based encryptionMultikey Fully Homomorphic Encryption and ApplicationsA fully secure lattice-based signcryption with designated equality test in standard modelOn the hardness of the NTRU problemForward-secure revocable secret handshakes from latticesPublic-key encryption from homogeneous CLWEEntropic hardness of Module-LWE from module-NTRULattice-based programmable hash functions and applicationsConcrete security from worst-case to average-case lattice reductionsCompact lattice gadget and its applications to hash-and-sign signaturesToward practical lattice-based proof of knowledge from Hint-MLWELattice-based authenticated key exchange with tight security\textsf{DualMS}: efficient lattice-based two-round multi-signature with trapdoor-free simulation\(\mathrm{mR}_{\mathrm{LWE}}\)-CP-ABE: a revocable CP-ABE for post-quantum cryptographySome questions related to the reverse Minkowski theoremAttacks on the Search RLWE Problem with Small ErrorsProvably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum WorldCollusion Resistant Traitor Tracing from Learning with ErrorsExplicit Hard Instances of the Shortest Vector ProblemAnalysis of Error Terms of Signatures Based on Learning with ErrorsDrawing Bobbin Lace Graphs, or, Fundamental Cycles for a Subclass of Periodic GraphsTwo Efficient Tag-Based Encryption Schemes on LatticesSimplified Revocable Hierarchical Identity-Based Encryption from LatticesLattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with EaseDiscrete Gaussian Distributions via Theta FunctionsIdentity-based blind signature from latticesImproved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and ApplicationsOn the Semantic Security of Functional Encryption SchemesProvably Secure NTRU Instances over Prime Cyclotomic RingsRevisiting Lattice Attacks on Overstretched NTRU ParametersConstraint-Hiding Constrained PRFs for NC $$^1$$ from LWEImproved Zero-Knowledge Identification with LatticesCryptographic Functions from Worst-Case Complexity AssumptionsConcurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice ProblemsLattice-Based Identification Schemes Secure Under Active AttacksWatermarking cryptographic functionalities from standard lattice assumptionsMulti-theorem preprocessing NIZKs from latticesTighter security proofs for GPV-IBE in the quantum random oracle modelPredicting Lattice ReductionInteger Version of Ring-LWE and Its ApplicationsAn Approximation of Theta Functions with Applications to CommunicationsThe Geometry of Lattice CryptographyA time-distance trade-off for GDD with preprocessing: instantiating the DLW heuristicKissing Numbers and Transference Theorems from Generalized Tail BoundsDeterministic Construction of an Approximate M-Ellipsoid and its Application to Derandomizing Lattice AlgorithmsUnnamed ItemMixing time and eigenvalues of the abelian sandpile Markov chainThe Restricted Isometry Property of Subsampled Fourier MatricesMeasure inequalities and the transference theorem in the geometry of numbersLattice-based linearly homomorphic signature scheme over binary fieldHomomorphic EncryptionSLIDE REDUCTION, SUCCESSIVE MINIMA AND SEVERAL APPLICATIONSSeparating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors AssumptionLattice-based key exchange on small integer solution problemA tighter proof for CCA secure inner product functional encryption: genericity meets efficiencyOn the hardness of module-LWE with binary secretEfficient multi-party concurrent signature from latticesCounterexamples to new circular security assumptions underlying iOLower bounds on lattice sieving and information set decodingSO-CCA secure PKE from pairing based all-but-many lossy trapdoor functionsAttribute-based signatures from lattices: unbounded attributes and semi-adaptive securityOn basing search SIVP on \(\mathbf{NP}\)-hardnessAn improved exact sampling algorithm for the standard normal distributionTwo-message statistically sender-private OT from LWEAdaptively secure distributed PRFs from LWELattice-based certificateless encryption schemeHomomorphic AES evaluation using the modified LTV schemeOn the higher-bit version of approximate inhomogeneous short integer solution problemGadget-based iNTRU lattice trapdoorsLattice-based IBE with equality test supporting flexible authorization in the standard modelOn the ring-LWE and polynomial-LWE problemsFaster Gaussian sampling for trapdoor lattices with arbitrary modulusNon-commutative ring learning with errors from cyclic algebrasPost-quantum cryptography: lattice signaturesLattice-based public-key encryption with equality test supporting flexible authorization in standard modelAsymptotically quasi-optimal cryptographyBatch-OT with optimal rateQuantum algorithms for variants of average-case lattice problems via filteringOn the lattice isomorphism problem, quadratic forms, remarkable lattices, and cryptographyQuantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptionsScalable revocable identity-based signature over lattices in the standard modelLattice trapdoors and IBE from middle-product LWEA pseudorandom number generator based on worst-case lattice problemsDiscrete Gaussian measures and new bounds of the smoothing parameter for latticesOn the smoothing parameter and last minimum of random orthogonal latticesAsymptotically efficient lattice-based digital signaturesBonsai trees, or how to delegate a lattice basisNew transference theorems on lattices possessing \(n^\varepsilon\)-unique shortest vectorsMore efficient construction of anonymous signaturesSecret computation of purchase history data using somewhat homomorphic encryptionOn the number of lattice points in a small sphere and a recursive lattice decoding algorithmOn the hardness of module learning with errors with short distributionsHardness of \(k\)-LWE and applications in traitor tracingA polynomial time algorithm for GapCVPP in \(l_1\) normOn the asymptotic complexity of solving LWEThe hunting of the SNARKSecurity considerations for Galois non-dual RLWE familiesNon-committing encryption with constant ciphertext expansion from standard assumptionsTowards classical hardness of module-LWE: the linear rank caseComputational indistinguishability between quantum states and its cryptographic applicationIncremental symmetric puncturable encryption with support for unbounded number of puncturesVector and functional commitments from latticesOn the probability of generating a latticePolar sampler: a novel Bernoulli sampler using polar codes with application to integer Gaussian samplingPractical fully secure unrestricted inner product functional encryption modulo \(p\)STP-LWE: A variant of learning with error for a flexible encryptionAn efficient homomorphic aggregate signature scheme based on latticeAn efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using latticeProvably secure NTRUEncrypt over any cyclotomic fieldTrapdoor delegation and HIBE from middle-product LWE in standard modelStrongly secure authenticated key exchange from factoring, codes, and latticesEfficient public-key encryption with equality test from latticesOn a certain class of positive definite functions and measures on locally compact abelian groups and inner-product spacesA simple provably secure AKE from the LWE problemImproved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distanceGenerating shorter bases for hard random latticesConfined guessing: new signatures from standard assumptionsTowards a ring analogue of the leftover hash lemmaIdentity-based proxy re-signatures from latticesA lattice-based signcryption scheme without random oraclesAdaptively secure distributed PRFs from \(\mathsf{LWE}\)Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymityModular lattice signatures, revisitedAn efficient anti-quantum lattice-based blind signature for blockchain-enabled systemsKey recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU latticesTweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizesMPSign: a signature from small-secret middle-product learning with errorsDecentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}A \(2^{n/2}\)-time algorithm for \(\sqrt{n} \)-SVP and \(\sqrt{n} \)-Hermite SVP, and an improved time-approximation tradeoff for (H)SVPNew lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertextsMultiparty reusable non-interactive secure computation from LWEChosen ciphertext attacks secure inner-product functional encryption from learning with errors assumptionNon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsHow (Not) to Instantiate Ring-LWEFHE Circuit Privacy Almost for FreeCircular Security Separations for Arbitrary Length Cycles from LWEProgrammable Hash Functions from Lattices: Short Signatures and IBEs with Small Key SizesWildcarded identity-based encryption from latticesChosen-ciphertext lattice-based public key encryption with equality test in standard modelA new Gaussian sampling for trapdoor lattices with arbitrary modulusLattice-based revocable certificateless signatureStrongly unforgeable ring signature scheme from lattices in the standard modelOn the rejection rate of exact sampling algorithm for discrete Gaussian distributions over the integersLattice reduction for modules, or how to reduce ModuleSVP to ModuleSVPRandom self-reducibility of ideal-SVP via Arakelov random walksLWE with side information: attacks and concrete security estimationWorst-case to average-case reductions for module latticesImplementation of lattice trapdoors on modules and applicationsShort identity-based signatures with tight security from latticesSecure hybrid encryption in the standard model from hard learning problemsOn the quantum complexity of the continuous hidden subgroup problemHardness of LWE on general entropic distributionsIntegral matrix Gram root and lattice Gaussian sampling without floats