Gladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed Decryption
From MaRDI portal
Publication:6041282
DOI10.1007/978-3-030-92068-5_5zbMATH Open1514.94069OpenAlexW3129081080MaRDI QIDQ6041282FDOQ6041282
Varun Maram, Kelong Cong, Daniele Cozzo, N. P. Smart
Publication date: 26 May 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/20.500.11850/502280
Recommendations
- Efficient identity-based encryption from LWR
- GLUE: generalizing unbounded attribute-based encryption for flexible efficiency trade-offs
- RESILIENT LKH: SECURE MULTICAST KEY DISTRIBUTION SCHEMES
- Adaptively secure distributed PRFs from LWE
- Adding distributed decryption and key generation to a ring-LWE based CCA encryption scheme
- Distributed Public-Key Cryptography from Weak Secrets
- Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware
- Efficient public key encryption based on ideal lattices (extended abstract)
- scientific article; zbMATH DE number 907956
- scientific article
Cites Work
- Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
- Title not available (Why is that?)
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Secure integration of asymmetric and symmetric encryption schemes
- Multiparty Computation from Somewhat Homomorphic Encryption
- Securing threshold cryptosystems against chosen ciphertext attack
- Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions
- Securing threshold cryptosystems against chosen ciphertext attack
- Title not available (Why is that?)
- Semi-homomorphic Encryption and Multiparty Computation
- Secure integration of asymmetric and symmetric encryption schemes
- Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
- Secure two-party computation is practical
- Title not available (Why is that?)
- Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol
- A modular analysis of the Fujisaki-Okamoto transformation
- Estimate all the {LWE, NTRU} schemes!
- Theory of Cryptography
- Faster Secure Multi-party Computation of AES and DES Using Lookup Tables
- Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems
- Threshold cryptosystems from threshold fully homomorphic encryption
- Learning with Rounding, Revisited
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
- On the Hardness of Learning with Rounding over Small Modulus
- Cryptography and Coding
- Tag-KEM/DEM: A new framework for hybrid encryption
- Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting
- Threshold schemes from isogeny assumptions
- Sharing the LUOV: threshold post-quantum signatures
- How to record quantum queries, and applications to quantum indifferentiability
- Sashimi: Cutting up CSI-FiSh Secret Keys to Produce an Actively Secure Distributed Signing Protocol
- Error detection in monotone span programs with application to communication-efficient multi-party computation
- Adding distributed decryption and key generation to a ring-LWE based CCA encryption scheme
- Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM
Cited In (2)
This page was built for publication: Gladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed Decryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6041282)