Classical hardness of learning with errors

From MaRDI portal
Publication:5495828

DOI10.1145/2488608.2488680zbMath1293.68159arXiv1306.0281OpenAlexW2089477764WikidataQ57484383 ScholiaQ57484383MaRDI QIDQ5495828

Zvika Brakerski, Chris Peikert, Damien Stehlé, Adeline Roux-Langlois, Oded Regev

Publication date: 7 August 2014

Published in: Proceedings of the forty-fifth annual ACM symposium on Theory of Computing (Search for Journal in Brave)

Full work available at URL: https://arxiv.org/abs/1306.0281




Related Items (only showing first 100 items - show all)

Adaptive Simulation Security for Inner Product Functional EncryptionConstraining and Watermarking PRFs from Milder AssumptionsAlmost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and MoreFully Homomorphic Encryption with Auxiliary InputsTrapdoors for Ideal Lattices with ApplicationsTowards a Simpler Lattice Gadget ToolkitClassical Verification of Quantum ComputationsLattice-Based Group Encryption with Full Dynamicity and Message Filtering PolicyFaster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALSBatch bootstrapping. I: A new framework for SIMD bootstrapping in polynomial modulusJust how hard are rotations of \(\mathbb{Z}^n\)? Algorithms and cryptography with the simplest latticePrivately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomnessEfficient FHEW bootstrapping with small evaluation keys, and applications to threshold homomorphic encryptionA thorough treatment of highly-efficient NTRU instantiationsSolving LWR via BDD Strategy: Modulus Switching ApproachFiat-Shamir signatures based on module-NTRURelaxed Lattice-Based Signatures with Short Zero-Knowledge ProofsMore efficient adaptively secure lattice-based IBE with equality test in the standard modelClassical reduction of gap SVP to LWE: a concrete security analysisLattice-based signatures with tight adaptive corruptions and moremrNISC from LWE with polynomial modulusmrNISC from LWE with polynomial modulus\textsc{Hawk}: module LIP makes lattice signatures fast, compact and simpleNew and improved constructions for partially equivocable public key encryptionFull quantum equivalence of group action DLog and CDH, and moreAnother round of breaking and making quantum money: how to not build it from lattices, and moreGeneric constructions of master-key KDM secure attribute-based encryptionBalanced non-adjacent formsLeveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with RoundingHow to sample a discrete Gaussian (and more) from a random oracleEntropic hardness of Module-LWE from module-NTRUGeneric construction of trace-and-revoke inner product functional encryptionQuantum search-to-decision reduction for the LWE problemToward practical lattice-based proof of knowledge from Hint-MLWELattice-based authenticated key exchange with tight securityA lower bound for proving hardness of learning with rounding with polynomial modulusHardness of (M)LWE with semi-uniform seedsCollusion Resistant Traitor Tracing from Learning with ErrorsJust Take the Average! An Embarrassingly Simple $2^n$-Time Algorithm for SVP (and CVP)Ring Packing and Amortized FHEW BootstrappingLP Solutions of Vectorial Integer Subset Sums – Cryptanalysis of Galbraith’s Binary Matrix LWEPrivate Puncturable PRFs from Standard Lattice AssumptionsConstraint-Hiding Constrained PRFs for NC $$^1$$ from LWEOn Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEALWatermarking cryptographic functionalities from standard lattice assumptionsMulti-theorem preprocessing NIZKs from latticesTighter security proofs for GPV-IBE in the quantum random oracle modelAdaptive oblivious transfer with access control from lattice assumptionsInteger Version of Ring-LWE and Its ApplicationsClassical Homomorphic Encryption for Quantum CircuitsUnnamed ItemUnnamed ItemQuantum Hardness of Learning Shallow Classical CircuitsThe Complexity of Public-Key CryptographyHomomorphic EncryptionSeparating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors AssumptionLattice-Based SNARGs and Their Application to More Efficient ObfuscationCompact ring signatures from learning with errorsA black-box approach to post-quantum zero-knowledge in constant roundsOn solving LPN using BKW and variants, Implementation and analysisOn the hardness of module-LWE with binary secretHow to meet ternary LWE keysSmoothing out binary linear codes and worst-case sub-exponential hardness for LPNSO-CCA secure PKE from pairing based all-but-many lossy trapdoor functionsAttribute-based signatures from lattices: unbounded attributes and semi-adaptive securityOn basing search SIVP on \(\mathbf{NP}\)-hardnessTraitor-tracing from LWE made simple and attribute-basedTwo-message statistically sender-private OT from LWEError analysis of weak poly-LWE instancesUniversal product learning with errors: a new variant of \textsf{LWE} for lattice-based cryptographyApproximate-Deterministic Public Key Encryption from Hard Learning ProblemsMulti-key FHE from LWE, RevisitedDeniable Attribute Based Encryption for Branching Programs from LWETargeted Homomorphic Attribute-Based EncryptionAttribute-based conditional proxy re-encryption in the standard model under LWELattice-based HRA-secure attribute-based proxy re-encryption in standard modelOn the higher-bit version of approximate inhomogeneous short integer solution problemOn the ring-LWE and polynomial-LWE problemsOn the Efficacy of Solving LWE by Reduction to Unique-SVPSecure Statistical Analysis Using RLWE-Based Homomorphic EncryptionPuncturable identity-based and attribute-based encryption from latticesOn the lattice isomorphism problem, quadratic forms, remarkable lattices, and cryptographyAlgebraically structured LWE. RevisitedMatrix PRFs: constructions, attacks, and applications to obfuscationGeneralized approach for analysing quantum key distribution experimentsFHEW with Efficient Multibit BootstrappingEfficient and fully secure lattice-based IBE with equality testAugmented Learning with Errors: The Untapped Potential of the Error TermOn the hardness of module learning with errors with short distributionsScalable zero knowledge via cycles of elliptic curvesHardness of \(k\)-LWE and applications in traitor tracingZero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group EncryptionSignature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice AssumptionsTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionOn the asymptotic complexity of solving LWEComputational fuzzy extractor from LWEFaster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 SecondsAdaptively secure inner product encryption from LWEFinding collisions in a quantum world: quantum black-box separation of collision-resistance and one-waynessTowards classical hardness of module-LWE: the linear rank case




This page was built for publication: Classical hardness of learning with errors