An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero

From MaRDI portal
Publication:2971014

DOI10.1112/S1461157016000371zbMath1404.94053MaRDI QIDQ2971014

Jinhyuck Jeong, Jung Hee Cheon, Changmin Lee

Publication date: 4 April 2017

Published in: LMS Journal of Computation and Mathematics (Search for Journal in Brave)




Related Items

A trace map attack against special ring-LWE samplesThe MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacksQuantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptionsFrom minicrypt to obfustopia via private-key functional encryptionFrom FE combiners to secure MPC and backAttribute based encryption for deterministic finite automata from DLINNTRU Fatigue: How Stretched is Overstretched?Digital Signatures Based on the Hardness of Ideal Lattice Problems in All RingsCharacterizing overstretched NTRU attacksA thorough treatment of highly-efficient NTRU instantiationsA polynomial time algorithm for breaking NTRU encryption with multiple keysFINAL: faster FHE instantiated with NTRU and LWEMulti-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrappingMultikey Fully Homomorphic Encryption and ApplicationsOn the hardness of the NTRU problemPublic key encryption with equality test from generic assumptions in the random oracle modelCollusion Resistant Traitor Tracing from Learning with ErrorsA Practical Post-Quantum Public-Key Cryptosystem Based on $$\textsf {spLWE}$$Provably secure NTRUEncrypt over any cyclotomic fieldA Lattice Attack on Homomorphic NTRU with Non-invertible Public KeysProvably Secure NTRU Instances over Prime Cyclotomic RingsRevisiting Lattice Attacks on Overstretched NTRU ParametersFrom Minicrypt to Obfustopia via Private-Key Functional EncryptionOne-Shot Verifiable Encryption from LatticesFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsA framework for cryptographic problems from linear algebraCan PPAD hardness be based on standard cryptographic assumptions?Generalized Hardness Assumption for Self-bilinear Map with Auxiliary InformationOptimal broadcast encryption from pairings and LWECombiners for functional encryption, unconditionallyOn the ideal shortest vector problem over random rational primesThe Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEsAnnihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13A Subfield Lattice Attack on Overstretched NTRU AssumptionsConstrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegationAlgebraic Aspects of Solving Ring-LWE, Including Ring-Based Improvements in the Blum--Kalai--Wasserman AlgorithmFast reduction of algebraic lattices over cyclotomic fieldsCryptanalyses of Candidate Branching Program Obfuscators


Uses Software


Cites Work