On lattices, learning with errors, random linear codes, and cryptography

From MaRDI portal
Publication:5899512

DOI10.1145/1568318.1568324zbMath1325.68101OpenAlexW2007466965MaRDI QIDQ5899512

Oded Regev

Publication date: 11 November 2015

Published in: Journal of the ACM (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/1568318.1568324




Related Items

Adaptive Simulation Security for Inner Product Functional EncryptionPAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard ModelConstraining and Watermarking PRFs from Milder AssumptionsImproved Discrete Gaussian and Subgaussian Analysis for Lattice CryptographyThe Power of Few Qubits and Collisions – Subset Sum Below Grover’s BoundA Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third PartiesFast Discretized Gaussian Sampling and Post-quantum TLS CiphersuiteEfficient Verifiable Partially-Decryptable Commitments from Lattices and ApplicationsEfficient Construction of Public-Key Matrices in Lattice-Based Cryptography: Chaos Strikes AgainMessage-Restriction-Free Commitment Scheme Based on Lattice AssumptionA Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMsShorter Lattice-Based Group Signatures via “Almost Free” Encryption and Other OptimizationsLMCLAEKS: LWE-assisted multi-recipient certificateless authenticated encryption with keyword searchMultiparty noninteractive key exchange from ring key-homomorphic weak PRFsFunctional commitments for all functions, with transparent setup and from SISDiscretization error reduction for high precision torus fully homomorphic encryptionEfficient FHEW bootstrapping with small evaluation keys, and applications to threshold homomorphic encryptionOn the feasibility of single-trace attacks on the Gaussian sampler using a CDTA thorough treatment of highly-efficient NTRU instantiationsSemi-quantum tokenized signaturesOblivious message retrievalGraphic lattices made by graph felicitous-type labelings and colorings of topological codingLattice-based zero-knowledge proofs and applications: shorter, simpler, and more generalSolving LWR via BDD Strategy: Modulus Switching ApproachRevisiting the Sparsification Technique in Kannan’s Embedding Attack on LWEHybrid dual and meet-LWE attackClassical reduction of gap SVP to LWE: a concrete security analysismrNISC from LWE with polynomial modulusHomomorphic encryption: a mathematical surveyRevocable identity-based fully homomorphic signature scheme with signing key exposure resistanceRevisiting group oriented secret sharing schemesmrNISC from LWE with polynomial modulusLarge-precision homomorphic sign evaluation using FHEW/TFHE bootstrappingClassically verifiable NIZK for QMA with preprocessingSubfield attacks on HSVP in ideal latticesOn the measurement and simulation of the BKZ behavior for \(q\)-ary latticesIdentity-based interactive aggregate signatures from latticesCumulatively all-lossy-but-one trapdoor functions from standard assumptionsCryptographic primitives with hinting propertyTowards practical topology-hiding computationFrom the hardness of detecting superpositions to cryptography: quantum public key encryption and commitmentsSemantic embedding for quantum algorithmsQuantum mutual implicit authentication key agreement protocol without entanglement with key recyclingA framework for practical anonymous credentials from latticesA fully secure lattice-based signcryption with designated equality test in standard modelAn Efficient Algorithm for Integer Lattice ReductionPublic-coin 3-round zero-knowledge from learning with errors and keyless multi-collision-resistant hashSecuring approximate homomorphic encryption using differential privacyMaliciously secure massively parallel computation for all-but-one corruptionsOn the hardness of the NTRU problemBalanced non-adjacent formsTransciphering framework for approximate homomorphic encryptionA new lattice-based online/offline signatures framework for low-power devicesLattice-based inner product argumentLeveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with RoundingA New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusionA survey on functional encryptionThe direction of updatable encryption does matterPublic-key encryption from homogeneous CLWEPublic key authenticated encryption with keyword search from LWENo-directional and backward-leak uni-directional updatable encryption are equivalentConcrete security from worst-case to average-case lattice reductionsFast blind rotation for bootstrapping FHEsHERMES: efficient ring packing using MLWE ciphertexts and application to transcipheringAccelerating HE operations from key decomposition techniqueSimple tests of quantumness also certify qubitsA detailed analysis of Fiat-Shamir with abortsToward practical lattice-based proof of knowledge from Hint-MLWEHRA-secure attribute-based threshold proxy re-encryption from lattices\(\mathrm{mR}_{\mathrm{LWE}}\)-CP-ABE: a revocable CP-ABE for post-quantum cryptographySubfield algorithms for ideal- and module-SVP based on the decomposition groupMathematics of computation through the lens of linear equations and latticesA lattice-based forward secure IBE scheme for Internet of thingsJust Take the Average! An Embarrassingly Simple $2^n$-Time Algorithm for SVP (and CVP)Deterministic compression with uncertain priorsConstructing concrete hard instances of the maximum independent set problemThe Average-Case Complexity of Counting Cliques in Erdös--Rényi HypergraphsOne-Shot Verifiable Encryption from LatticesShort Stickelberger Class Relations and Application to Ideal-SVPPrivate Puncturable PRFs from Standard Lattice AssumptionsConstraint-Hiding Constrained PRFs for NC $$^1$$ from LWEOn Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEALMagic Adversaries Versus Individual Reduction: Science Wins Either WayThe truth behind the myth of the folk theoremExpanders with respect to Hadamard spaces and random graphsUnnamed ItemLimits of local algorithms over sparse random graphsRound-optimal secure multi-party computationImproved learning of \(k\)-paritiesVerifying quantum computations at scale: A cryptographic leash on quantum devicesNovel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard ModelSumcheck-based delegation of quantum computing to rational serverInteger Version of Ring-LWE and Its ApplicationsOn Quantum Chosen-Ciphertext Attacks and Learning with ErrorsHardness of bounded distance decoding on lattices in lp normsKissing Numbers and Transference Theorems from Generalized Tail BoundsSurvey of Lattice-Based Group SignatureTowards Round-Optimal Secure Multiparty Computations: Multikey FHE Without a CRSMeta-heuristic approaches to solve shortest lattice vector problemRLWE/PLWE equivalence for totally real cyclotomic subextensions via quasi-Vandermonde matricesA Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard ModelAttribute-Based Keyword Search from LatticesOn CCA-Secure Somewhat Homomorphic EncryptionImproved Information Set Decoding for Code-Based Cryptosystems with Constrained MemoryTrapdoors for Ideal Lattices with Applications3-Message Zero Knowledge Against Human IgnorancePredicate Encryption for Circuits from LWEQuantum Homomorphic Encryption for Circuits of Low T-gate ComplexityCoded-BKW: Solving LWE Using Lattice CodesAn Improved BKW Algorithm for LWE with Applications to Cryptography and LatticesProvably Weak Instances of Ring-LWEMulti-key FHE from LWE, RevisitedOn the Efficacy of Solving LWE by Reduction to Unique-SVPWhen NTT meets Karatsuba: preprocess-then-NTT technique revisitedLattice Point Enumeration on Block Reduced BasesQuantum learning Boolean linear functions w.r.t. product distributionsQuantum algorithms for typical hard problems: a perspective of cryptanalysisOn the hardness of module learning with errors with short distributionsOn optimizing electricity markets performanceMultikey Fully Homomorphic Encryption and ApplicationsAdaptively secure inner product encryption from LWETowards classical hardness of module-LWE: the linear rank caseSecurity limitations of classical-client delegated quantum computingUnnamed ItemUnclonable encryption, revisitedOn error distributions in ring-based LWESimulatable verifiable random function from the LWE assumptionA Practical Post-Quantum Public-Key Cryptosystem Based on $$\textsf {spLWE}$$Analysis of Error Terms of Signatures Based on Learning with ErrorsAligned Drawings of Planar GraphsGrid-Obstacle Representations with Connections to Staircase GuardingLattice-based FHE as secure as PKECryptogenographyLimits of random oracles in secure computationNon-commutative arithmetic circuits with divisionDecision trees, protocols and the entropy-influence conjectureLocally testable codes and cayley graphsInvitation games and the price of stabilityWelfare maximization and truthfulness in mechanism design with ordinal preferencesCoordination mechanisms from (almost) all scheduling policiesPrivate interactive communication across an adversarial channelTree codes and a conjecture on exponential sumsCapacity of non-malleable codesLinear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applicationsAdversarial hypothesis testing and a quantum stein's lemma for restricted measurementsSequential decision making with vector outcomesLearning mixtures of arbitrary distributions over large discrete domainsWhy do simple algorithms for triangle enumeration work in the real world?Black-box obfuscation for d-CNFsCandidate weak pseudorandom functions in AC 0 ○ MOD 2Iterated group products and leakage resilience against NC1Building one-time memories from isolated qubitsAttribute-efficient evolvability of linear functionsEnergy-efficient circuit designRate-independent computation in continuous chemical reaction networksTesters and their applicationsOn the automorphism groups of strongly regular graphs IFaster private release of marginals on small databasesMechanism design in large gamesRedrawing the boundaries on purchasing data from privacy-sensitive individualsApproximation schemes via Sherali-Adams hierarchy for dense constraint satisfaction problems and assignment problemsComplexity of approximating CSP with balance / hard constraintsInteger feasibility of random polytopesMultireference alignment using semidefinite programmingPartial tests, universal tests and decomposabilityHigh dimensional expanders and property testingParameterized testabilityDirect sum fails for zero error average communicationRational argumentsBI-NTRU Encryption Schemes: Two New Secure Variants of NTRUUnnamed ItemTighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge SettingGeneric Construction of Bounded-Collusion IBE via Table-Based ID-to-Key MapAgnostic Learning from Tolerant Natural ProofsIdentity-based blind signature from latticesNew Algorithms for Learning in Presence of ErrorsPacked Ciphertexts in LWE-Based Homomorphic EncryptionImproved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and ApplicationsFinding Shortest Lattice Vectors in the Presence of GapsAdaptive Security with Quasi-Optimal RateDecompositions of Triangle-Dense GraphsFinding Correlations in Subquadratic Time, with Applications to Learning Parities and the Closest Pair ProblemBetter Key Sizes (and Attacks) for LWE-Based EncryptionAn LWE-based verifiable threshold secret sharing schemeA Noiseless Key-Homomorphic PRF: Application on Distributed Storage SystemsThe Geometry of Lattice CryptographyA novel fully homomorphic encryption scheme bsed on LWENaor-Yung Paradigm with Shared Randomness and ApplicationsHow (Not) to Instantiate Ring-LWESampling Exactly from the Normal DistributionThree’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWESpooky Encryption and Its ApplicationsFully Secure Functional Encryption for Inner Products, from Standard AssumptionsUnnamed ItemQuantum Hardness of Learning Shallow Classical CircuitsPseudorandom Functions: Three Decades LaterHomomorphic EncryptionWeak Zero-Knowledge beyond the Black-Box BarrierCompact ring signatures from learning with errorsA black-box approach to post-quantum zero-knowledge in constant roundsMulti-theorem designated-verifier NIZK for QMAOn the hardness of module-LWE with binary secretShortest vectors in lattices of Bai-Galbraith's embedding attack on the LWR problemPolly cracker, revisitedOn basing search SIVP on \(\mathbf{NP}\)-hardnessTopology-hiding computation beyond semi-honest adversariesTraitor-tracing from LWE made simple and attribute-basedTwo-message statistically sender-private OT from LWELattice-based certificateless encryption schemePuncturable pseudorandom sets and private information retrieval with near-optimal online bandwidth and timeError analysis of weak poly-LWE instancesTightly secure signatures from lossy identification schemesAttribute-based conditional proxy re-encryption in the standard model under LWECross-domain attribute-based access control encryptionOn the higher-bit version of approximate inhomogeneous short integer solution problemOn the ring-LWE and polynomial-LWE problemsFast near collision attack on the Grain v1 stream cipherNon-commutative ring learning with errors from cyclic algebrasEfficient cryptosystems from \(2^k\)-th power residue symbolsApproximate CVP in time \(2^{0.802 n}\) -- now in any norm!Lattice-based public-key encryption with equality test supporting flexible authorization in standard modelA note on the concrete hardness of the shortest independent vector in latticesNaor-Yung paradigm with shared randomness and applicationsPractical non-interactive publicly verifiable secret sharing with thousands of parties\(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryptionSingle-server private information retrieval with sublinear amortized timeWatermarking PRFs against quantum adversariesOn the lattice isomorphism problem, quadratic forms, remarkable lattices, and cryptographyConstant-round blind classical verification of quantum samplingA unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemesToward non-interactive zero-knowledge proofs for NP from LWEBootstrapping for helibScalable revocable identity-based signature over lattices in the standard modelFrom cryptomania to obfustopia through secret-key functional encryptionAlgebraically structured LWE. RevisitedMatrix PRFs: constructions, attacks, and applications to obfuscationCompressible FHE with applications to PIROn the RLWE/PLWE equivalence for cyclotomic number fieldsCryptographic algorithms for privacy-preserving online applicationsBonsai trees, or how to delegate a lattice basisComparison analysis of Ding's RLWE-based key exchange protocol and NewHope variantsImproved analysis of the reduction from BDD to uSVPHardness of \(k\)-LWE and applications in traitor tracingSecurity considerations for Galois non-dual RLWE familiesComputational indistinguishability between quantum states and its cryptographic applicationGroup signature from lattices preserving forward security in dynamic settingLattice-based proxy-oriented identity-based encryption with keyword search for cloud storageSolving the learning parity with noise's open questionComputational fuzzy extractorsSTP-LWE: A variant of learning with error for a flexible encryptionStrongly secure authenticated key exchange from factoring, codes, and latticesThe projection games conjecture and the hardness of approximation of Super-SAT and related problemsHILA5: on reliability, reconciliation, and error correction for Ring LWE encryptionA public-key encryption scheme based on non-linear indeterminate equationsA simple provably secure AKE from the LWE problemEverlasting multi-party computationImproved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distanceA multi-key SMC protocol and multi-key FHE based on some-are-errorless LWEEnhancing Goldreich, Goldwasser and Halevi's scheme with intersecting latticesOn the structure of Boolean functions with small spectral normVerifying solutions to LWE with implications for concrete securityTowards a ring analogue of the leftover hash lemmaCollusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard modelParallel Cholesky-based reduction for the weighted integer least squares problemOn the condition number of the Vandermonde matrix of the \(n\)th cyclotomic polynomialA lattice-based signcryption scheme without random oraclesSampling from discrete Gaussians for lattice-based cryptography on a constrained deviceCompact designated verifier NIZKs from the CDH assumption without pairingsVerifiable single-server private information retrieval from LWE with binary errorsRound-optimal blind signatures in the plain model from classical and quantum standard assumptionsA \(2^{n/2}\)-time algorithm for \(\sqrt{n} \)-SVP and \(\sqrt{n} \)-Hermite SVP, and an improved time-approximation tradeoff for (H)SVPOn the ideal shortest vector problem over random rational primesOn the security of homomorphic encryption on approximate numbersClassical vs quantum random oraclesOn the success probability of solving unique SVP via BKZOn the integer polynomial learning with errors problemExact lattice sampling from non-Gaussian distributionsGroup encryption: full dynamicity, message filtering and code-based instantiationWildcarded identity-based encryption from latticesLWE from non-commutative group ringsChosen-ciphertext lattice-based public key encryption with equality test in standard modelA new Gaussian sampling for trapdoor lattices with arbitrary modulusPractical \(\mathsf{MP} \text{- }\mathsf{LWE}\)-based encryption balancing security-risk versus efficiencySharing privacy protected and statistically sound clinical research data using outsourced data storageOn the rejection rate of exact sampling algorithm for discrete Gaussian distributions over the integersLattice reduction for modules, or how to reduce ModuleSVP to ModuleSVPRandom self-reducibility of ideal-SVP via Arakelov random walksSlide reduction, revisited -- filling the gaps in SVP approximationAn optimized GHV-type HE scheme: simpler, faster, and more versatileA new post-quantum multivariate polynomial public key encapsulation algorithmFiat-Shamir for repeated squaring with applications to PPAD-hardness and VDFsImproved lattice enumeration algorithms by primal and dual reordering methodsWorst-case to average-case reductions for module latticesLeveraging the hardness of dihedral coset problem for quantum cryptographyAn improved quantum algorithm for the quantum learning with errors problemPassword protected secret sharing from latticesOn removing rejection conditions in practical lattice-based signaturesKey-homomorphic pseudorandom functions from LWE with small modulus