Making NTRU as Secure as Worst-Case Problems over Ideal Lattices

From MaRDI portal
Publication:3003372

DOI10.1007/978-3-642-20465-4_4zbMath1281.94057OpenAlexW1936753088MaRDI QIDQ3003372

Damien Stehlé, Ron Steinfeld

Publication date: 27 May 2011

Published in: Advances in Cryptology – EUROCRYPT 2011 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-20465-4_4




Related Items (61)

How to meet ternary LWE keysLattice-based certificateless encryption schemeAn efficient CCA-secure cryptosystem over ideal lattices from identity-based encryptionHomomorphic AES evaluation using the modified LTV schemeTightly secure signatures from lossy identification schemesBlending FHE-NTRU Keys – The Excalibur PropertyProvably Weak Instances of Ring-LWEOn the ring-LWE and polynomial-LWE problemsShort, invertible elements in partially splitting cyclotomic rings and applications to lattice-based zero-knowledge proofsApplication of automorphic forms to lattice problemsVandermonde meets Regev: public key encryption schemes based on partial Vandermonde problemsDepth Optimized Efficient Homomorphic SortingHigh-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega MicrocontrollersPrivate Computation on Encrypted Genomic DataA Novel Certificateless Multi-signature Scheme over NTRU LatticesAdaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption SchemesNTRU Fatigue: How Stretched is Overstretched?A novel identity-based multi-signature scheme over NTRU latticesA signature scheme from the finite field isomorphism problemFlattening NTRU for evaluation key free homomorphic encryptionCharacterizing overstretched NTRU attacksA thorough treatment of highly-efficient NTRU instantiationsLattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable (extended abstract)Shorter hash-and-sign lattice-based signaturesA polynomial time algorithm for breaking NTRU encryption with multiple keysMulti-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrappingIdentity-based interactive aggregate signatures from latticesD-NTRU: more efficient and average-case IND-CPA secure NTRU variantMultikey Fully Homomorphic Encryption and ApplicationsOn the hardness of the NTRU problemEfficient lattice-based inner-product functional encryptionQuantum rewinding for many-round protocolsSecurity considerations for Galois non-dual RLWE familiesLattice-based cryptography: a surveySubfield algorithms for ideal- and module-SVP based on the decomposition groupAttacks on the Search RLWE Problem with Small ErrorsChoosing Parameters for NTRUEncryptOn the geometry of cyclic latticesProvably secure NTRUEncrypt over any cyclotomic fieldBI-NTRU Encryption Schemes: Two New Secure Variants of NTRUA Lattice Attack on Homomorphic NTRU with Non-invertible Public KeysETRU: NTRU over the Eisenstein integersA public-key encryption scheme based on non-linear indeterminate equationsNTRU prime: reducing attack surface at low costVulnerable public keys in NTRU cryptosystemSecurity analysis of cryptosystems using short generators over ideal latticesProvably Secure NTRU Instances over Prime Cyclotomic RingsRevisiting Lattice Attacks on Overstretched NTRU ParametersOne-Shot Verifiable Encryption from LatticesShort Stickelberger Class Relations and Application to Ideal-SVPTowards a ring analogue of the leftover hash lemmaPost-Quantum Cryptography: State of the ArtInteger Version of Ring-LWE and Its ApplicationsCandidate Indistinguishability Obfuscation and Functional Encryption for All CircuitsKey recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU latticesOn the ideal shortest vector problem over random rational primesThe Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEsLWE from non-commutative group ringsA Subfield Lattice Attack on Overstretched NTRU AssumptionsLattice reduction for modules, or how to reduce ModuleSVP to ModuleSVPWorst-case to average-case reductions for module lattices


Uses Software



This page was built for publication: Making NTRU as Secure as Worst-Case Problems over Ideal Lattices