Tightly secure ring-LWE based key encapsulation with short ciphertexts
From MaRDI portal
Recommendations
- A simple and efficient CCA-secure lattice KEM in the standard model
- Efficient chosen ciphertext secure key encapsulation mechanism in standard model over ideal lattices
- Direct CCA-secure KEM and deterministic PKE from plain LWE
- Compact and simple RLWE based key encapsulation mechanism
- Tightly-secure key-encapsulation mechanism in the quantum random oracle model
Cites work
- scientific article; zbMATH DE number 1341866 (Why is no real title available?)
- A masked ring-LWE implementation
- A modular analysis of the Fujisaki-Okamoto transformation
- A practical post-quantum public-key cryptosystem based on spLWE
- A toolkit for ring-LWE cryptography
- An improved BKW algorithm for LWE with applications to cryptography and lattices
- Better key sizes (and attacks) for LWE-based encryption
- Compact ring-LWE cryptoprocessor
- Cryptography and Coding
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Easy verifiable primitives and practical public key cryptosystems
- Efficient Fully Homomorphic Encryption from (Standard) LWE
- Efficient ring-LWE encryption on 8-bit AVR processors
- Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
- Fully homomorphic encryption from ring-LWE and security for key dependent messages
- Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based
- Lattice cryptography for the internet
- Lattice decoding attacks on binary LWE
- Lattice-based Cryptography
- On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL
- On ideal lattices and learning with errors over rings
- On lattices, learning with errors, random linear codes, and cryptography
- On the concrete hardness of learning with errors
- Parallel implementation of \textsf{BDD} enumeration for \textsf{LWE}
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
- Random oracles in a quantum world
- Secure integration of asymmetric and symmetric encryption schemes
- Secure integration of asymmetric and symmetric encryption schemes
Cited in
(5)- Compact and simple RLWE based key encapsulation mechanism
- Zaytun: lattice based PKE and KEM with shorter ciphertext size
- Security of public key encryption against resetting attacks
- scientific article; zbMATH DE number 7156413 (Why is no real title available?)
- Encryption Schemes Using Random Oracles: From Classical to Post-Quantum Security
This page was built for publication: Tightly secure ring-LWE based key encapsulation with short ciphertexts
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2167708)