On the concrete hardness of learning with errors

From MaRDI portal
Publication:745110

DOI10.1515/jmc-2015-0016zbMath1352.94023OpenAlexW2400700555MaRDI QIDQ745110

Martin R. Albrecht, Rachel Player, Sam Scott

Publication date: 13 October 2015

Published in: Journal of Mathematical Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1515/jmc-2015-0016




Related Items

Efficient lattice-based blind signatures via Gaussian one-time signaturesRevisiting group oriented secret sharing schemesLarge-precision homomorphic sign evaluation using FHEW/TFHE bootstrappingFINAL: faster FHE instantiated with NTRU and LWEMulti-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrappingMyOPE: malicious security for oblivious polynomial evaluationTowards case-optimized hybrid homomorphic encryption. Featuring the \textsf{Elisabeth} stream cipherPrivate join and compute from PIR with defaultModeling and simulating the sample complexity of solving LWE using BKW-style algorithmsPolar coding for ring-LWE-based public key encryptionLattice-based inner product argumentLattice-based public key cryptosystems invoking linear mapping mask\textsf{ComBo}: a novel functional bootstrapping method for efficient evaluation of nonlinear functions in the encrypted domainFinding and evaluating parameters for BGVFast blind rotation for bootstrapping FHEsEfficient hybrid exact/relaxed lattice proofs and applications to rounding and VRFsPrivate AI: Machine Learning on Encrypted DataLattice-based proof of shuffle and applications to electronic votingSoK: how (not) to design and implement post-quantum cryptographyDual lattice attacks for closest vector problems (with preprocessing)Improved Discrete Gaussian and Subgaussian Analysis for Lattice CryptographyShort Zero-Knowledge Proof of Knowledge for Lattice-Based CommitmentMhz2K: MPC from HE over \(\mathbb{Z}_{2^k}\) with new packing, simpler reshare, and better ZKPA compressed \(\varSigma \)-protocol theory for latticesHow to meet ternary LWE keysA trace map attack against special ring-LWE samplesShortest vectors in lattices of Bai-Galbraith's embedding attack on the LWR problemLattice-based zero-knowledge arguments for additive and multiplicative relationsEfficient lattice-based polynomial evaluation and batch ZK argumentsLow-gate quantum golden collision findingHomomorphic Encryption StandardSolving the search-LWE problem over projected latticesAn extension of Kannan's embedding for solving ring-based LWE problemsBlack-box accumulation based on latticesHow to find ternary LWE keys using locality sensitive hashingWhen HEAAN meets FV: a new somewhat homomorphic encryption with reduced memory overheadTransciphering, using FiLIP and TFHE for an efficient delegation of computationMaking the BKW algorithm practical for LWEOn a dual/hybrid approach to small secret LWE. A dual/enumeration technique for learning with errors and application to security estimates of FHE schemesFiat-Shamir and correlation intractability from strong KDM-secure encryptionHomomorphic lower digits removal and improved FHE bootstrappingHomomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more dataBootstrapping for approximate homomorphic encryptionTightly secure ring-LWE based key encapsulation with short ciphertextsPractical non-interactive publicly verifiable secret sharing with thousands of partiesSine series approximation of the mod function for bootstrapping of approximate HEField instruction multiple dataMcEliece needs a break -- solving McEliece-1284 and quasi-cyclic-2918 with modern ISDBootstrapping for helibMultitarget Decryption Failure Attacks and Their Application to Saber and KyberPredicting the concrete security of LWE against the dual attack using binary searchComparison analysis of Ding's RLWE-based key exchange protocol and NewHope variantsA detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attackEstimation of the hardness of the learning with errors problem with a restricted number of samplesFaster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALSOn homomorphic secret sharing from polynomial-modulus LWEDiscretization error reduction for high precision torus fully homomorphic encryptionOptimisations and tradeoffs for HElibEfficient FHEW bootstrapping with small evaluation keys, and applications to threshold homomorphic encryptionA thorough treatment of highly-efficient NTRU instantiations\texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryptionOblivious message retrievalAn estimator for the hardness of the MQ problemA new framework for more efficient round-optimal lattice-based (partially) blind signature via trapdoor samplingSETLA: Signature and Encryption from LatticesSolving LWR via BDD Strategy: Modulus Switching ApproachRevisiting the Sparsification Technique in Kannan’s Embedding Attack on LWEHybrid dual and meet-LWE attackVerifiable decryption in the headPartial key exposure attacks on BIKE, Rainbow and NTRUParameter optimization and larger precision for (T)FHEQuantum-resistant password-based threshold single-sign-on authentication with updatable server private keyOn the asymptotic complexity of solving LWEFaster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 SecondsPost-quantum key exchange for the Internet and the open quantum safe projectImproving speed and security in updatable encryption schemesEfficient homomorphic comparison methods with optimal complexitySimpler statistically sender private oblivious transfer from ideals of cyclotomic integersRing-based identity based encryption -- asymptotically shorter MPK and tighter securitySecret handshakes: full dynamicity, deniability and lattice-based designA Practical Post-Quantum Public-Key Cryptosystem Based on $$\textsf {spLWE}$$Assessing the feasibility of single trace power analysis of FrodoPublic key compression for constrained linear signature schemesA full RNS variant of approximate homomorphic encryptionPractical Fully Homomorphic Encryption for Fully Masked Neural NetworksThe lattice-based digital signature scheme qTESLAEfficient public-key encryption with equality test from latticesEfficient reductions in cyclotomic rings -- application to Ring LWE based FHE schemesHILA5: on reliability, reconciliation, and error correction for Ring LWE encryptionOn Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEALSomewhat/Fully Homomorphic Encryption: Implementation Progresses and ChallengesGroup signatures and more from isogenies and lattices: generic, simple, and efficientCHIMERA: combining ring-LWE-based fully homomorphic encryption schemesLearning strikes again: the case of the DRS signature schemeTFHE: fast fully homomorphic encryption over the torus(One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemesTweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizesMPSign: a signature from small-secret middle-product learning with errorsNew lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertextsOn bounded distance decoding with predicate: breaking the ``lattice barrier for the hidden number problemEfficient bootstrapping for approximate homomorphic encryption with non-sparse keysPrivacy-Friendly Forecasting for the Smart Grid Using Homomorphic Encryption and the Group Method of Data HandlingParallel Implementation of BDD Enumeration for LWEOn the success probability of solving unique SVP via BKZShorter lattice-based zero-knowledge proofs via one-time commitmentsRound-optimal verifiable oblivious pseudorandom functions from ideal latticesTowards Sound Fresh Re-keying with Hard (Physical) Learning ProblemsFaster enumeration-based lattice reduction: root Hermite factor \(k^{1/(2k)}\) time \(k^{k/8+o(k)}\)Rounding in the ringsRevocable hierarchical attribute-based signatures from latticesBootstrapping for approximate homomorphic encryption with negligible failure-probability by using sparse-secret encapsulationEfficient homomorphic conversion between (ring) LWE ciphertextsOn removing rejection conditions in practical lattice-based signaturesA practical adaptive key recovery attack on the LGM (GSW-like) cryptosystemRevisiting orthogonal lattice attacks on approximate common divisor problemsKey-homomorphic pseudorandom functions from LWE with small modulus


Uses Software