Pseudorandom Functions and Lattices

From MaRDI portal
Publication:2894440

DOI10.1007/978-3-642-29011-4_42zbMath1297.68071OpenAlexW190530026MaRDI QIDQ2894440

Abhishek Banerjee, Alon Rosen, Chris Peikert

Publication date: 29 June 2012

Published in: Advances in Cryptology – EUROCRYPT 2012 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-29011-4_42




Related Items (90)

Limits on the Efficiency of (Ring) LWE Based Non-interactive Key ExchangeConstraining and Watermarking PRFs from Milder AssumptionsAlmost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and MoreShortest vectors in lattices of Bai-Galbraith's embedding attack on the LWR problemKey mismatch attack on ThreeBears, Frodo and Round5Attribute-based signatures from lattices: unbounded attributes and semi-adaptive securityAdaptively secure distributed PRFs from LWEExploring crypto dark matter: new simple PRF candidates and their applicationsQuantum algorithms for the \(k\)-XOR problemLow-complexity weak pseudorandom functions in \(\mathtt{AC}0[\mathtt{MOD}2\)] ⋮ Fast Pseudorandom Functions Based on Expander GraphsApproximate-Deterministic Public Key Encryption from Hard Learning ProblemsFrom Selective to Adaptive Security in Functional EncryptionEfficient Pseudorandom Functions via On-the-Fly AdaptationAn Algebraic Framework for Pseudorandom Functions and Applications to Related-Key SecurityPractical post-quantum few-time verifiable random function with applications to AlgorandWatermarking Cryptographic CapabilitiesThe polynomial learning with errors problem and the smearing conditionMultitarget Decryption Failure Attacks and Their Application to Saber and KyberTwo-Round Oblivious Linear Evaluation from Learning with ErrorsMatrix PRFs: constructions, attacks, and applications to obfuscationFrom FE combiners to secure MPC and backSemi-quantum moneyEfficient and fully secure lattice-based IBE with equality testMultiparty noninteractive key exchange from ring key-homomorphic weak PRFsOn homomorphic secret sharing from polynomial-modulus LWETowards Tightly Secure Lattice Short Signature and Id-Based EncryptionFORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes\texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryptionSolving LWR via BDD Strategy: Modulus Switching ApproachEfficient unique ring signatures from latticesA note on the post-quantum security of (ring) signaturesMulti-authority ABE from lattices without random oraclesComputational fuzzy extractor from LWECumulatively all-lossy-but-one trapdoor functions from standard assumptionsWitness encryption and null-iO from evasive LWEFormal verification of Saber's public-key encryption scheme in easycryptLeveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with RoundingUnnamed ItemBatched fully dynamic multi-key FHE from FHEW-like cryptosystemsLearning with physical rounding for linear and quadratic leakage functionsConstant input attribute based (and predicate) encryption from evasive and tensor LWEEfficient hybrid exact/relaxed lattice proofs and applications to rounding and VRFsError correction and ciphertext quantization in lattice cryptographyA lower bound for proving hardness of learning with rounding with polynomial modulusHardness of (M)LWE with semi-uniform seedsImproving speed and security in updatable encryption schemesScalable ciphertext compression techniques for post-quantum KEMs and their applicationsLattice-based e-cash, revisitedA combinatorial approach to quantum random functionsDirect computation of branching programs and its applications to more efficient lattice-based cryptographySimulatable verifiable random function from the LWE assumptionSimple and more efficient PRFs with tight security from LWE and matrix-DDHCompact Hierarchical IBE from Lattices in the Standard ModelBi-homomorphic Lattice-Based PRFs and Unidirectional Updatable EncryptionExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationStrongly secure authenticated key exchange from factoring, codes, and latticesNTRU prime: reducing attack surface at low costPseudorandom functions in NC class from the standard LWE assumptionImproved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distancePrivate Puncturable PRFs from Standard Lattice AssumptionsConstraint-Hiding Constrained PRFs for NC $$^1$$ from LWEEnhancing Goldreich, Goldwasser and Halevi's scheme with intersecting latticesUnnamed ItemWatermarking cryptographic functionalities from standard lattice assumptionsSimple and generic constructions of succinct functional encryptionOn the Hardness of Learning with Rounding over Small ModulusTraceable ring signatures: general framework and post-quantum securityTighter security proofs for GPV-IBE in the quantum random oracle modelAdaptively secure distributed PRFs from \(\mathsf{LWE}\)Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymityLimits on the efficiency of (ring) LWE-based non-interactive key exchangeHomomorphic Evaluation of Lattice-Based Symmetric Encryption SchemesMultiparty reusable non-interactive secure computation from LWEOn the integer polynomial learning with errors problemRate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacksRound-optimal verifiable oblivious pseudorandom functions from ideal latticesTowards Sound Fresh Re-keying with Hard (Physical) Learning ProblemsInteractive Clustering of Linear Classes and Cryptographic Lower BoundsUnnamed ItemQuantum Hardness of Learning Shallow Classical CircuitsAdaptively secure constrained pseudorandom functions in the standard modelRounding in the ringsMulti-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input SettingA new post-quantum multivariate polynomial public key encapsulation algorithmPseudorandom Functions: Three Decades LaterSeparating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors AssumptionShort identity-based signatures with tight security from latticesHardness of LWE on general entropic distributionsKey-homomorphic pseudorandom functions from LWE with small modulus




This page was built for publication: Pseudorandom Functions and Lattices