Three’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE
From MaRDI portal
Publication:2829234
DOI10.1007/978-3-662-53008-5_23zbMath1391.94721OpenAlexW2493056435MaRDI QIDQ2829234
Publication date: 27 October 2016
Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53008-5_23
Related Items (7)
Universal amplification of KDM security: from 1-key circular to multi-key KDM ⋮ Lockable obfuscation from circularly insecure fully homomorphic encryption ⋮ KDM security for identity-based encryption: constructions and separations ⋮ Separating IND-CPA and Circular Security for Unbounded Length Key Cycles ⋮ Bounded KDM Security from iO and OWF ⋮ Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption ⋮ Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Probabilistic encryption
- New Circular Security Counterexamples from Decision Linear and Learning with Errors
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Circular Security Separations for Arbitrary Length Cycles from LWE
- Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
- Circular and KDM Security for Identity-Based Encryption
- New Definitions and Separations for Circular Security
- Obfuscation ⇒ (IND-CPA Security $\not\Rightarrow$ Circular Security)
- Black-Box Circular-Secure Encryption beyond Affine Functions
- Efficient Circuit-Size Independent Public Key Encryption with KDM Security
- Key-Dependent Message Security: Generic Amplification and Completeness
- Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
- Trapdoors for hard lattices and new cryptographic constructions
- On Ideal Lattices and Learning with Errors over Rings
- Cryptographic Agility and Its Relation to Circular Encryption
- Bounded Key-Dependent Message Security
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Circular-Secure Encryption from Decision Diffie-Hellman
- A Toolkit for Ring-LWE Cryptography
- Fully homomorphic encryption using ideal lattices
- Public-key cryptosystems from the worst-case shortest vector problem
- Separations in Circular Security for Arbitrary Length Key Cycles
- Classical hardness of learning with errors
- On lattices, learning with errors, random linear codes, and cryptography
This page was built for publication: Three’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE