On Ideal Lattices and Learning with Errors over Rings

From MaRDI portal
Publication:5395738

DOI10.1145/2535925zbMath1281.68140OpenAlexW2071825329MaRDI QIDQ5395738

Vadim Lyubashevsky, Chris Peikert, Oded Regev

Publication date: 17 February 2014

Published in: Journal of the ACM (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/2535925




Related Items

On the hardness of module-LWE with binary secretPAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard ModelHomomorphic Encryption StandardLattice-based certificateless encryption schemeTightly secure signatures from lossy identification schemesAn Improved BKW Algorithm for LWE with Applications to Cryptography and LatticesMulti-key FHE from LWE, RevisitedMemory lower bounds of reductions revisitedOn the ring-LWE and polynomial-LWE problemsFaster Gaussian sampling for trapdoor lattices with arbitrary modulusVandermonde meets Regev: public key encryption schemes based on partial Vandermonde problemsA Ring-LWE-based digital signature inspired by Lindner-Peikert schemeAlgebraically structured LWE. RevisitedCompressible FHE with applications to PIRShorter lattice-based zero-knowledge proofs for the correctness of a shuffleAdaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption SchemesA detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attackNTRU Fatigue: How Stretched is Overstretched?On the hardness of module learning with errors with short distributionsHardness of \(k\)-LWE and applications in traitor tracingDigital Signatures Based on the Hardness of Ideal Lattice Problems in All RingsOblivious message retrievalSETLA: Signature and Encryption from LatticesVerifiable Decryption for Fully Homomorphic EncryptionQuantum-resistant password-based threshold single-sign-on authentication with updatable server private keySecuring approximate homomorphic encryption using differential privacyBalanced non-adjacent formsFault-enabled chosen-ciphertext attacks on KyberSecurity considerations for Galois non-dual RLWE familiesAttacks on the Search RLWE Problem with Small ErrorsTowards classical hardness of module-LWE: the linear rank caseSLAP: simpler, improved private stream aggregation from ring learning with errorsBI-NTRU Encryption Schemes: Two New Secure Variants of NTRUNTRU prime: reducing attack surface at low costImproved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distanceSecurity analysis of cryptosystems using short generators over ideal latticesComputing Generator in Cyclotomic Integer RingsOne-Shot Verifiable Encryption from LatticesShort Stickelberger Class Relations and Application to Ideal-SVPConstraint-Hiding Constrained PRFs for NC $$^1$$ from LWEEnhancing Goldreich, Goldwasser and Halevi's scheme with intersecting latticesVerifying solutions to LWE with implications for concrete security(In)security of ring-LWE under partial key exposureTowards a ring analogue of the leftover hash lemmaPost-Quantum Forward-Secure Onion RoutingMPSign: a signature from small-secret middle-product learning with errorsOn the security of homomorphic encryption on approximate numbersPrivacy-Friendly Forecasting for the Smart Grid Using Homomorphic Encryption and the Group Method of Data HandlingOn Quantum Chosen-Ciphertext Attacks and Learning with ErrorsThe Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEsHow (Not) to Instantiate Ring-LWEUnnamed ItemQuantum Hardness of Learning Shallow Classical CircuitsOn the rejection rate of exact sampling algorithm for discrete Gaussian distributions over the integersRandom self-reducibility of ideal-SVP via Arakelov random walksImproved lattice-based mix-nets for electronic votingHomomorphic Encryption