Lattice Cryptography for the Internet

From MaRDI portal
Publication:2938684

DOI10.1007/978-3-319-11659-4_12zbMath1383.94037OpenAlexW151792660WikidataQ21820637 ScholiaQ21820637MaRDI QIDQ2938684

Chris Peikert

Publication date: 14 January 2015

Published in: Post-Quantum Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-319-11659-4_12




Related Items

Computational quantum key distribution (CQKD) on decentralized ledger and blockchainSoK: how (not) to design and implement post-quantum cryptographyEfficient Password-Authenticated Key Exchange from RLWE Based on Asymmetric Key ConsensusLimits on the Efficiency of (Ring) LWE Based Non-interactive Key ExchangePAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard ModelTowards post-quantum security for signal's X3DH handshakeImproved attacks against key reuse in learning with errors key exchangeSponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length MessageTightly secure ring-LWE based key encapsulation with short ciphertextsThe polynomial learning with errors problem and the smearing conditionAlgebraic generalization of Diffie-Hellman key exchangeComparison analysis of Ding's RLWE-based key exchange protocol and NewHope variantsAugmented Learning with Errors: The Untapped Potential of the Error TermA Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMsModular Design of Role-Symmetric Authenticated Key Exchange ProtocolsMultiparty noninteractive key exchange from ring key-homomorphic weak PRFsSETLA: Signature and Encryption from LatticesOn the Security of Supersingular Isogeny CryptosystemsPost-quantum signal key agreement from SIDHForward-secure revocable secret handshakes from latticesPost-quantum key exchange for the Internet and the open quantum safe projectSecure Implementation of Lattice-Based Encryption SchemesA full RNS variant of FV like somewhat homomorphic encryption schemesSubvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryptionTwo-pass authenticated key exchange with explicit authentication and tight securityProvably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum WorldA Practical Post-Quantum Public-Key Cryptosystem Based on $$\textsf {spLWE}$$Post-quantum static-static key agreement using multiple protocol instancesHILA5: on reliability, reconciliation, and error correction for Ring LWE encryptionA simple provably secure AKE from the LWE problemEfficient Compression of SIDH Public KeysEnhancing Goldreich, Goldwasser and Halevi's scheme with intersecting latticesPost-Quantum Forward-Secure Onion RoutingLimits on the efficiency of (ring) LWE-based non-interactive key exchangeModular lattice signatures, revisitedThe Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEsHow (Not) to Instantiate Ring-LWEPractical \(\mathsf{MP} \text{- }\mathsf{LWE}\)-based encryption balancing security-risk versus efficiencyStrongly leakage resilient authenticated key exchange, revisitedA new post-quantum multivariate polynomial public key encapsulation algorithmPractical post-quantum password-authenticated key exchange based-on module-latticeAdaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oraclesOn removing rejection conditions in practical lattice-based signatures