A Toolkit for Ring-LWE Cryptography
From MaRDI portal
Publication:4924402
DOI10.1007/978-3-642-38348-9_3zbMath1300.94082OpenAlexW31130112MaRDI QIDQ4924402
Vadim Lyubashevsky, Chris Peikert, Oded Regev
Publication date: 31 May 2013
Published in: Advances in Cryptology – EUROCRYPT 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-38348-9_3
Related Items (80)
Lattice-based proof of shuffle and applications to electronic voting ⋮ PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model ⋮ Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography ⋮ Efficient Post-quantum SNARKs for RSIS and RLWE and Their Applications to Privacy ⋮ Homomorphic Encryption Standard ⋮ LWE without modular reduction and improved side-channel attacks against BLISS ⋮ Trapdoors for Ideal Lattices with Applications ⋮ Provably Weak Instances of Ring-LWE ⋮ Memory lower bounds of reductions revisited ⋮ On the ring-LWE and polynomial-LWE problems ⋮ Faster Gaussian sampling for trapdoor lattices with arbitrary modulus ⋮ Short, invertible elements in partially splitting cyclotomic rings and applications to lattice-based zero-knowledge proofs ⋮ Application of automorphic forms to lattice problems ⋮ Non-commutative ring learning with errors from cyclic algebras ⋮ Tightly secure ring-LWE based key encapsulation with short ciphertexts ⋮ Asymptotically quasi-optimal cryptography ⋮ Bootstrapping for helib ⋮ Properties of constacyclic codes under the Schur product ⋮ Post-quantum online voting scheme ⋮ Asymptotically efficient lattice-based digital signatures ⋮ Augmented Learning with Errors: The Untapped Potential of the Error Term ⋮ On the hardness of module learning with errors with short distributions ⋮ Batch bootstrapping. I: A new framework for SIMD bootstrapping in polynomial modulus ⋮ Batch bootstrapping. II: Bootstrapping in polynomial modulus only requires \(\tilde{O}(1)\) FHE multiplications in amortization ⋮ On homomorphic secret sharing from polynomial-modulus LWE ⋮ Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps ⋮ The linear transformation that relates the canonical and coefficient embeddings of ideals in cyclotomic integer rings ⋮ Lattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable (extended abstract) ⋮ MuSig-L: lattice-based multi-signature with single-round online phase ⋮ Verifiable decryption in the head ⋮ The closest vector problem in tensored root lattices of type A and in their duals ⋮ Lattice signature with efficient protocols, application to anonymous credentials ⋮ Polar coding for ring-LWE-based public key encryption ⋮ Efficient lattice-based inner-product functional encryption ⋮ Batched fully dynamic multi-key FHE from FHEW-like cryptosystems ⋮ Post-quantum key exchange for the Internet and the open quantum safe project ⋮ \textsf{DualMS}: efficient lattice-based two-round multi-signature with trapdoor-free simulation ⋮ Hardness of (M)LWE with semi-uniform seeds ⋮ Improving speed and security in updatable encryption schemes ⋮ Simpler statistically sender private oblivious transfer from ideals of cyclotomic integers ⋮ Bootstrapping for BGV and BFV revisited ⋮ Ring-based identity based encryption -- asymptotically shorter MPK and tighter security ⋮ A Practical Post-Quantum Public-Key Cryptosystem Based on $$\textsf {spLWE}$$ ⋮ Provably secure NTRUEncrypt over any cyclotomic field ⋮ Efficient, actively secure MPC with a dishonest majority: a survey ⋮ Efficient public-key encryption with equality test from lattices ⋮ On the Scaled Inverse of $(x^i-x^j)$ modulo Cyclotomic Polynomial of the form $\Phi_{p^s}(x)$ or $\Phi_{p^s q^t}(x)$ ⋮ Efficient reductions in cyclotomic rings -- application to Ring LWE based FHE schemes ⋮ HILA5: on reliability, reconciliation, and error correction for Ring LWE encryption ⋮ Finite interval-time transition system for real-time actors ⋮ LP Solutions of Vectorial Integer Subset Sums – Cryptanalysis of Galbraith’s Binary Matrix LWE ⋮ Provably Secure NTRU Instances over Prime Cyclotomic Rings ⋮ Computing Generator in Cyclotomic Integer Rings ⋮ Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE ⋮ On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL ⋮ Group signatures and more from isogenies and lattices: generic, simple, and efficient ⋮ Discretisation and product distributions in ring-LWE ⋮ (In)security of ring-LWE under partial key exposure ⋮ Towards a ring analogue of the leftover hash lemma ⋮ Adaptive Security with Quasi-Optimal Rate ⋮ Tighter security proofs for GPV-IBE in the quantum random oracle model ⋮ Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices ⋮ Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices ⋮ Sampling from discrete Gaussians for lattice-based cryptography on a constrained device ⋮ Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes ⋮ On the security of homomorphic encryption on approximate numbers ⋮ On Quantum Chosen-Ciphertext Attacks and Learning with Errors ⋮ The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs ⋮ How (Not) to Instantiate Ring-LWE ⋮ Three’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE ⋮ Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes ⋮ Chosen-ciphertext lattice-based public key encryption with equality test in standard model ⋮ Quantum Hardness of Learning Shallow Classical Circuits ⋮ A new Gaussian sampling for trapdoor lattices with arbitrary modulus ⋮ Algebraic Aspects of Solving Ring-LWE, Including Ring-Based Improvements in the Blum--Kalai--Wasserman Algorithm ⋮ Rounding in the rings ⋮ Efficient pseudorandom correlation generators from ring-LPN ⋮ A new post-quantum multivariate polynomial public key encapsulation algorithm ⋮ Worst-case to average-case reductions for module lattices ⋮ Implementation of lattice trapdoors on modules and applications
Uses Software
This page was built for publication: A Toolkit for Ring-LWE Cryptography