An Efficient and Parallel Gaussian Sampler for Lattices

From MaRDI portal
Publication:3582749

DOI10.1007/978-3-642-14623-7_5zbMath1280.94091OpenAlexW2140256428MaRDI QIDQ3582749

Chris Peikert

Publication date: 24 August 2010

Published in: Advances in Cryptology – CRYPTO 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-14623-7_5




Related Items

A constant-time sampling algorithm for binary Gaussian distribution over the integersOn the hardness of module-LWE with binary secretImproved Discrete Gaussian and Subgaussian Analysis for Lattice CryptographyIsochronous Gaussian Sampling: From Inception to ImplementationCOSAC: COmpact and Scalable Arbitrary-Centered Discrete Gaussian Sampling over IntegersFast Discretized Gaussian Sampling and Post-quantum TLS CiphersuiteFully Homomorphic Encryption with Auxiliary InputsOn the higher-bit version of approximate inhomogeneous short integer solution problemGadget-based iNTRU lattice trapdoorsFaster Gaussian sampling for trapdoor lattices with arbitrary modulusNon-commutative ring learning with errors from cyclic algebrasA note on the concrete hardness of the shortest independent vector in latticesBatch-OT with optimal rate\textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon}On the lattice isomorphism problem, quadratic forms, remarkable lattices, and cryptographySampling from Arbitrary Centered Discrete Gaussians for Lattice-Based CryptographyTowards a Simpler Lattice Gadget ToolkitDiscrete Gaussian measures and new bounds of the smoothing parameter for latticesBonsai trees, or how to delegate a lattice basisOn the hardness of module learning with errors with short distributionsImproved power analysis attacks on FalconEfficient laconic cryptography from learning with errorsHardness of \(k\)-LWE and applications in traitor tracingSender-binding key encapsulationGaussian sampling of lattices for cryptographic applicationsShorter hash-and-sign lattice-based signatures\textsc{Hawk}: module LIP makes lattice signatures fast, compact and simpleOn the hardness of the NTRU problemCompact lattice gadget and its applications to hash-and-sign signaturesToward practical lattice-based proof of knowledge from Hint-MLWEAlmost tight multi-user security under adaptive corruptions from LWE in the standard modelHardness of (M)LWE with semi-uniform seedsTowards classical hardness of module-LWE: the linear rank casePolar sampler: a novel Bernoulli sampler using polar codes with application to integer Gaussian samplingLattice-based completely non-malleable public-key encryption in the standard modelProvably secure NTRUEncrypt over any cyclotomic fieldA lattice-based group signature scheme with verifier-local revocationImproved (Hierarchical) Inner-Product Encryption from LatticesEnhancing Goldreich, Goldwasser and Halevi's scheme with intersecting latticesLearning strikes again: the case of the DRS signature schemeA Note on Discrete Gaussian Combinations of Lattice VectorsTighter security proofs for GPV-IBE in the quantum random oracle modelLattice-based unidirectional infinite-use proxy re-signatures with private re-signature keyBetter Key Sizes (and Attacks) for LWE-Based EncryptionTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesTwo-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from latticesSampling from discrete Gaussians for lattice-based cryptography on a constrained deviceKey recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU latticesExact lattice sampling from non-Gaussian distributionsIdentity-based encryption with security against the KGC: a formal model and its instantiationsThe Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEsFHE Circuit Privacy Almost for FreeA new Gaussian sampling for trapdoor lattices with arbitrary modulusOn the rejection rate of exact sampling algorithm for discrete Gaussian distributions over the integersRounding in the ringsWorst-case to average-case reductions for module latticesSecure hybrid encryption in the standard model from hard learning problemsHardness of LWE on general entropic distributionsIntegral matrix Gram root and lattice Gaussian sampling without floats


Uses Software