On lattices, learning with errors, random linear codes, and cryptography

From MaRDI portal
Publication:5901106

DOI10.1145/1060590.1060603zbMath1192.94106OpenAlexW2061949491WikidataQ54066002 ScholiaQ54066002MaRDI QIDQ5901106

Oded Regev

Publication date: 16 August 2010

Published in: Proceedings of the thirty-seventh annual ACM symposium on Theory of computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/1060590.1060603




Related Items

Lattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable (extended abstract)Shorter hash-and-sign lattice-based signaturesSome easy instances of ideal-SVP and implications on the partial Vandermonde knapsack problemOn codes and learning with errors over function fieldsBreaking the Hardness Assumption and IND-CPA Security of HQC Submitted to NIST PQC ProjectAchieving Almost-Full Security for Lattice-Based Fully Dynamic Group Signatures with Verifier-Local RevocationFiat-Shamir signatures based on module-NTRUMulti-key Homomorphic Proxy Re-EncryptionParameter optimization and larger precision for (T)FHEZero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoorsBatched fully homomorphic encryption from TFHELattice-based signatures with tight adaptive corruptions and moreMulti-authority ABE from lattices without random oraclesRate-1 incompressible encryption from standard assumptionsAchievable \textsf{CCA2} relaxation for homomorphic encryptionHomomorphic encryption: a mathematical surveyFully collusion resistant trace-and-revoke functional encryption for arbitrary identitiesZero-knowledge protocols for the subset sum problem from MPC-in-the-head with rejectionMulti-key fully homomorphic encryption from NTRU and (R)LWE with faster bootstrappingSubfield attacks on HSVP in ideal latticesPreimage sampling in the higher-bit approximate setting with a non-spherical Gaussian samplerNew and improved constructions for partially equivocable public key encryptionTowards case-optimized hybrid homomorphic encryption. Featuring the \textsf{Elisabeth} stream cipherA non-heuristic approach to time-space tradeoffs and optimizations for BKWAnother round of breaking and making quantum money: how to not build it from lattices, and more(Inner-product) functional encryption with updatable ciphertextsTake your MEDS: digital signatures from matrix code equivalenceLattice signature with efficient protocols, application to anonymous credentialsGeneric constructions of master-key KDM secure attribute-based encryptionComputing primitive idempotents in finite commutative rings and applicationsCandidate witness encryption from lattice techniquesHow to build a trapdoor function from an encryption schemeImproved programmable bootstrapping with larger precision and efficient arithmetic circuits for TFHETime-release cryptography from minimal circuit assumptionsModeling and simulating the sample complexity of solving LWE using BKW-style algorithmsPolar coding for ring-LWE-based public key encryptionDilithium for memory constrained devicesNew constructions of collapsing hashesStatistically sender-private OT from LPN and derandomizationConstructive post-quantum reductionsLattice-Based Proof of a ShufflePost-quantum plaintext-awarenessForward-secure revocable secret handshakes from latticesPost-quantum asynchronous deniable key exchange and the signal handshakeLockable obfuscation from circularly insecure fully homomorphic encryptionEfficient lattice-based inner-product functional encryptionPost-quantum insecurity from LWEQuantum rewinding for many-round protocolsPublic-key encryption from homogeneous CLWEEntropic hardness of Module-LWE from module-NTRUSimplified server-aided revocable identity-based encryption from latticesLattice-based public key cryptosystems invoking linear mapping maskBatched fully dynamic multi-key FHE from FHEW-like cryptosystemsGeneric construction of trace-and-revoke inner product functional encryptionSpatial encryption revisited: from delegatable multiple inner product encryption and moreSecure Implementation of Lattice-Based Encryption SchemesLattice-based programmable hash functions and applicationsLattice-based cryptography: a surveyConcrete security from worst-case to average-case lattice reductionsFinding and evaluating parameters for BGVQuantum search-to-decision reduction for the LWE problemLearning with physical rounding for linear and quadratic leakage functionsBlack-hole radiation decoding is quantum cryptographyLattice-based authenticated key exchange with tight securityError correction and ciphertext quantization in lattice cryptographyAlmost tight multi-user security under adaptive corruptions from LWE in the standard modelLattice-based timed cryptographyA lower bound for proving hardness of learning with rounding with polynomial modulus\(\mathrm{mR}_{\mathrm{LWE}}\)-CP-ABE: a revocable CP-ABE for post-quantum cryptographyTraceable policy-based signatures and instantiation from latticesElliptic genera from classical error-correcting codesIndistinguishability obfuscationHardness of (M)LWE with semi-uniform seedsCandidate iO from homomorphic encryption schemesClassical Homomorphic Encryption for Quantum CircuitsOn CCA-Secure Somewhat Homomorphic EncryptionThe Cryptographic Power of Random SelectionCryptography from Learning Parity with NoiseSecure Multiparty RAM Computation in Constant RoundsApproximate-Deterministic Public Key Encryption from Hard Learning ProblemsDeniable Attribute Based Encryption for Branching Programs from LWETargeted Homomorphic Attribute-Based EncryptionSemi-adaptive Security and Bundling Functionalities Made Generic and EasyFrom Cryptomania to Obfustopia Through Secret-Key Functional EncryptionOn the Efficacy of Solving LWE by Reduction to Unique-SVPOblivious Transfer from Weakly Random Self-Reducible Public-Key CryptosystemFaster Sieving for Shortest Lattice Vectors Using Spherical Locality-Sensitive HashingFHEW with Efficient Multibit BootstrappingAugmented Learning with Errors: The Untapped Potential of the Error TermLeakage Resilience of the Blom’s Key Distribution SchemeZero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group EncryptionEfficient KDM-CCA Secure Public-Key Encryption for Polynomial FunctionsSignature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice AssumptionsTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionPartitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear MapsA Homomorphic Proxy Re-encryption from LatticesPreventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption SchemeEncoding Functions with Constant Online Rate, or How to Compress Garbled Circuit KeysFaster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 SecondsOptimization of $$\mathsf {LPN}$$ Solving AlgorithmsDirect computation of branching programs and its applications to more efficient lattice-based cryptographySecret handshakes: full dynamicity, deniability and lattice-based designMaliciously circuit-private multi-key FHE and MPC based on LWEPolar sampler: a novel Bernoulli sampler using polar codes with application to integer Gaussian samplingMulti-bit Leveled Homomorphic Encryption via $$\mathsf {Dual.LWE}$$ -BasedA Practical Post-Quantum Public-Key Cryptosystem Based on $$\textsf {spLWE}$$Lattice-based FHE as secure as PKECryptogenographyLimits of random oracles in secure computationNon-commutative arithmetic circuits with divisionDecision trees, protocols and the entropy-influence conjectureLocally testable codes and cayley graphsInvitation games and the price of stabilityWelfare maximization and truthfulness in mechanism design with ordinal preferencesCoordination mechanisms from (almost) all scheduling policiesPrivate interactive communication across an adversarial channelTree codes and a conjecture on exponential sumsCapacity of non-malleable codesLinear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applicationsAdversarial hypothesis testing and a quantum stein's lemma for restricted measurementsSequential decision making with vector outcomesLearning mixtures of arbitrary distributions over large discrete domainsWhy do simple algorithms for triangle enumeration work in the real world?Black-box obfuscation for d-CNFsCandidate weak pseudorandom functions in AC 0 ○ MOD 2Iterated group products and leakage resilience against NC1Building one-time memories from isolated qubitsAttribute-efficient evolvability of linear functionsEnergy-efficient circuit designRate-independent computation in continuous chemical reaction networksTesters and their applicationsOn the automorphism groups of strongly regular graphs IFaster private release of marginals on small databasesMechanism design in large gamesRedrawing the boundaries on purchasing data from privacy-sensitive individualsApproximation schemes via Sherali-Adams hierarchy for dense constraint satisfaction problems and assignment problemsComplexity of approximating CSP with balance / hard constraintsInteger feasibility of random polytopesMultireference alignment using semidefinite programmingPartial tests, universal tests and decomposabilityHigh dimensional expanders and property testingParameterized testabilityDirect sum fails for zero error average communicationRational argumentsAlgorithms for the Shortest and Closest Lattice Vector ProblemsGate Elimination for Linear Functions and New Feebly Secure ConstructionsFully Simulatable Quantum-Secure Coin-Flipping and ApplicationsPost-Quantum Forward-Secure Onion RoutingLower Bounds on Assumptions Behind Indistinguishability ObfuscationOn the Hardness of Learning with Rounding over Small ModulusTwo-Round Man-in-the-Middle Security from LPNReconfigurable Cryptography: A Flexible Approach to Long-Term SecurityCryptographic Assumptions: A Position PaperDecompositions of Triangle-Dense GraphsCCA-Secure Keyed-Fully Homomorphic EncryptionPost-Quantum Cryptography: State of the ArtLattice-based identity-based resplittable threshold public key encryption schemeAlgebraic cryptography: new constructions and their security against provable breakHomomorphic Evaluation of Lattice-Based Symmetric Encryption SchemesA Lattice-Based Group Signature Scheme with Message-Dependent OpeningTuring Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded FunctionsParallel Implementation of BDD Enumeration for LWEGeneralized Learning Problems and Applications to Non-commutative CryptographyNaor-Yung Paradigm with Shared Randomness and ApplicationsAdversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup ModuliFHE Circuit Privacy Almost for FreeTowards Sound Fresh Re-keying with Hard (Physical) Learning ProblemsCircular Security Separations for Arbitrary Length Cycles from LWEProgrammable Hash Functions from Lattices: Short Signatures and IBEs with Small Key SizesFully Secure Functional Encryption for Inner Products, from Standard AssumptionsCircuit-ABE from LWE: Unbounded Attributes and Semi-adaptive SecurityEfficient Threshold Encryption from Lossy Trapdoor FunctionsLattice-Based Fully Dynamic Multi-key FHE with Short CiphertextsCryptography with Auxiliary Input and Trapdoor from Constant-Noise LPNMeasure inequalities and the transference theorem in the geometry of numbersOn random nonsingular Hermite normal formLattice-based key exchange on small integer solution problemOn solving LPN using BKW and variants, Implementation and analysisNoisy Simon period findingSoK: how (not) to design and implement post-quantum cryptographyDual lattice attacks for closest vector problems (with preprocessing)On the hardness of module-LWE with binary secretBalancing access control and privacy for data deduplication via functional encryptionSO-CCA secure PKE from pairing based all-but-many lossy trapdoor functionsSignature schemes secure against hard-to-invert leakageTwo-round MPC: information-theoretic and black-boxTwo-message statistically sender-private OT from LWEAdaptively secure distributed PRFs from LWEReturn of GGH15: provable security against zeroizing attacksLWE without modular reduction and improved side-channel attacks against BLISSQuantum algorithms for the \(k\)-XOR problemPolicy-based signature scheme from latticesRegular lossy functions and their applications in leakage-resilient cryptographyReview of cryptographic schemes applied to remote electronic voting systems: remaining challenges and the upcoming post-quantum paradigmMemory lower bounds of reductions revisitedFiat-Shamir and correlation intractability from strong KDM-secure encryptionShortest vector from lattice sieving: a few dimensions for freeAnother step towards realizing random oracles: non-malleable point obfuscationA novel model for lattice-based authorized searchable encryption with special keywordA pseudorandom number generator based on worst-case lattice problemsFinding shortest lattice vectors faster using quantum searchNew transference theorems on lattices possessing \(n^\varepsilon\)-unique shortest vectorsHardness of \(k\)-LWE and applications in traitor tracingOn the asymptotic complexity of solving LWEThe hunting of the SNARKEfficient authentication from hard learning problemsPost-quantum key exchange for the Internet and the open quantum safe projectCircuit complexity of linear functions: gate elimination and feeble securityLeakage-resilient cryptography from puncturable primitives and obfuscationDecentralized multi-client functional encryption for inner productSimple and more efficient PRFs with tight security from LWE and matrix-DDHZero-knowledge arguments for matrix-vector relations and lattice-based group encryptionAssessing the feasibility of single trace power analysis of FrodoMinimal condition for shortest vectors in lattices of low dimensionQuantum private comparison over noisy channelsFunctional encryption for cubic polynomials and implementationEfficient reductions in cyclotomic rings -- application to Ring LWE based FHE schemesHILA5: on reliability, reconciliation, and error correction for Ring LWE encryptionA lattice-based group signature scheme with verifier-local revocationThe polynomial approximate common divisor problem and its application to the fully homomorphic encryptionA simple provably secure AKE from the LWE problemImproved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distanceA multivariate cryptosystem inspired by random linear codesFinite interval-time transition system for real-time actorsGenerating shorter bases for hard random latticesOn the structure of Boolean functions with small spectral normFunctional encryption for cascade automata(Leveled) Fully Homomorphic Encryption without BootstrappingA framework for cryptographic problems from linear algebraApproximate Voronoi cells for lattices, revisitedCollusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard modelTraceable ring signatures: general framework and post-quantum securityLattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasuresAdaptively secure distributed PRFs from \(\mathsf{LWE}\)Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymitySampling from discrete Gaussians for lattice-based cryptography on a constrained deviceCCA-security from adaptive all-but-one lossy trapdoor functionsLimits on the efficiency of (ring) LWE-based non-interactive key exchangeSeparating models of learning with faulty teachersOptimal broadcast encryption from pairings and LWECandidate iO from homomorphic encryption schemesImpossibility results for lattice-based functional encryption schemes(One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemesLow weight discrete logarithm and subset sum in \(2^{0.65n}\) with polynomial memoryMeasure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA securityTweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizesDecentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}Round-optimal blind signatures in the plain model from classical and quantum standard assumptionsNew lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertextsOn bounded distance decoding with predicate: breaking the ``lattice barrier for the hidden number problemMultiparty reusable non-interactive secure computation from LWEIndistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplificationCandidate obfuscation via oblivious LWE samplingBifurcated signatures: folding the accountability vs. anonymity dilemma into a single private signing schemeAn efficient CCA-secure access control encryption for any policyChosen ciphertext attacks secure inner-product functional encryption from learning with errors assumptionExact lattice sampling from non-Gaussian distributionsNon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsSingle-to-multi-theorem transformations for non-interactive statistical zero-knowledgeRound-optimal verifiable oblivious pseudorandom functions from ideal latticesIdentity-based encryption with security against the KGC: a formal model and its instantiationsLWE from non-commutative group ringsCryptography with constant input localityA new scale-invariant homomorphic encryption schemeIncompressible encodingsFast reduction of algebraic lattices over cyclotomic fieldsRounding in the ringsEfficient pseudorandom correlation generators from ring-LPNCovert authentication from latticesEfficient and tight oblivious transfer from PKE with tight multi-user securityGeneric transformation from broadcast encryption to round-optimal deniable ring authenticationAccess control encryption from group encryptionShort identity-based signatures with tight security from latticesSecure hybrid encryption in the standard model from hard learning problemsQuantum indistinguishability for public key encryptionImpossibility of quantum virtual black-box obfuscation of classical circuitsThree-round secure multiparty computation from black-box two-round oblivious transferA new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKsCounterexamples to new circular security assumptions underlying iOLattice reduction with approximate enumeration oracles. Practical algorithms and concrete performanceLower bounds on lattice sieving and information set decodingA trace map attack against special ring-LWE samplesShortest vectors in lattices of Bai-Galbraith's embedding attack on the LWR problemSmoothing out binary linear codes and worst-case sub-exponential hardness for LPNSuccinct non-interactive arguments via linear interactive proofsAn efficient CCA-secure cryptosystem over ideal lattices from identity-based encryptionError analysis of weak poly-LWE instancesUniversal product learning with errors: a new variant of \textsf{LWE} for lattice-based cryptographyAttribute-based access control for inner product functional encryption from LWEImproved attacks against key reuse in learning with errors key exchangeA note on perfect correctness by derandomizationLattice-based HRA-secure attribute-based proxy re-encryption in standard modelBlack-box accumulation based on latticesThe matrix reloaded: multiplication strategies in FrodoKEMSurvey of information securityMaking the BKW algorithm practical for LWEOn a dual/hybrid approach to small secret LWE. A dual/enumeration technique for learning with errors and application to security estimates of FHE schemesSecurity of public key encryption against resetting attacksGadget-based iNTRU lattice trapdoorsLattice-based IBE with equality test supporting flexible authorization in the standard modelAdaptively secure laconic function evaluation for \(\mathsf{NC}^1\)Application of automorphic forms to lattice problemsVandermonde meets Regev: public key encryption schemes based on partial Vandermonde problemsCiphertext-only attacks against compact-LWE submitted to NIST PQC projectPuncturable identity-based and attribute-based encryption from latticesTightly secure ring-LWE based key encapsulation with short ciphertextsA Ring-LWE-based digital signature inspired by Lindner-Peikert schemeThe polynomial learning with errors problem and the smearing conditionNaor-Yung paradigm with shared randomness and applicationsAsymptotically quasi-optimal cryptographySecure multiparty computation with sublinear preprocessingIndistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)Anamorphic encryption: private communication against a dictatorBatch-OT with optimal rateOne-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard modelQuantum algorithms for variants of average-case lattice problems via filteringQuantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptionsAttribute-based proxy re-encryption from standard latticesLattice trapdoors and IBE from middle-product LWEA black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreementLeveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzlesPermuted puzzles and cryptographic hardnessRevisiting approximate polynomial common divisor problem and noisy multipolynomial reconstructionGeneralized approach for analysing quantum key distribution experimentsAlgebraic generalization of Diffie-Hellman key exchangePost-quantum online voting schemeKey-recovery attacks on \(\mathsf{ASASA}\)Lattice-based secret handshakes with reusable credentialsPredicting the concrete security of LWE against the dual attack using binary searchEfficient and fully secure lattice-based IBE with equality testA detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attackEstimation of the hardness of the learning with errors problem with a restricted number of samplesQuantum algorithms for typical hard problems: a perspective of cryptanalysisOn the hardness of module learning with errors with short distributionsSample-size-reduction of quantum states for the noisy linear problemComputational fuzzy extractor from LWEImproved broadcast attacks against subset sum problems via lattice oracleImproving convergence and practicality of slide-type reductionsFinding collisions in a quantum world: quantum black-box separation of collision-resistance and one-waynessNon-committing encryption with constant ciphertext expansion from standard assumptionsCollusion resistant trace-and-revoke for arbitrary identities from standard assumptionsTowards classical hardness of module-LWE: the linear rank caseTwisted-PHS: using the product formula to solve approx-SVP in ideal latticesSimpler statistically sender private oblivious transfer from ideals of cyclotomic integersCryptographic group actions and applicationsA combinatorial approach to quantum random functionsComplexity theory. Abstracts from the workshop held November 14--20, 2021 (hybrid meeting)Post-quantum resettably-sound zero knowledgeThe round complexity of quantum zero-knowledgeRate-1 quantum fully homomorphic encryptionDecentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDHSuccinct LWE sampling, random polynomials, and obfuscationRing-based identity based encryption -- asymptotically shorter MPK and tighter securityUpdatable public key encryption in the standard modelOn the (M)iNTRU assumption in the integer caseRevocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and moreComputational fuzzy extractorsLattice-based completely non-malleable public-key encryption in the standard modelEfficient, actively secure MPC with a dishonest majority: a surveyExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationAlmost fully anonymous attribute-based group signatures with verifier-local revocation and member registration from lattice assumptionsEfficient public-key encryption with equality test from latticesPseudorandom functions in NC class from the standard LWE assumptionOn the complexity of the BKW algorithm on LWENovel updatable identity-based hash proof system and its applicationsCryptographic hardness for learning intersections of halfspacesTFHE: fast fully homomorphic encryption over the torusWorst case short lattice vector enumeration on block reduced bases of arbitrary blocksizesLattice-based group signatures: achieving full dynamicity (and deniability) with easePractical \(\mathsf{MP} \text{- }\mathsf{LWE}\)-based encryption balancing security-risk versus efficiencyStrongly leakage resilient authenticated key exchange, revisitedHardness of learning problems over Burnside groups of exponent 3Worst-case to average-case reductions for module latticesSuccinct non-interactive secure computationHardness of LWE on general entropic distributionsLimits on the Efficiency of (Ring) LWE Based Non-interactive Key ExchangeAlmost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and MoreDecryption Failure Is More Likely After SuccessCompact Lossy and All-but-One Trapdoor Functions from LatticeFully Homomorphic Encryption with Auxiliary InputsZero-Knowledge Interactive Proof Systems for New Lattice ProblemsSampling from Arbitrary Centered Discrete Gaussians for Lattice-Based CryptographyMultitarget Decryption Failure Attacks and Their Application to Saber and KyberReusable Two-Round MPC from LPNOn the Bottleneck Complexity of MPC with Correlated RandomnessTwo-Round Oblivious Linear Evaluation from Learning with ErrorsRational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard ModelClassical Verification of Quantum ComputationsLattice-Based Group Encryption with Full Dynamicity and Message Filtering PolicyA New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOVNTRU Fatigue: How Stretched is Overstretched?Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALSSublinear-communication secure multiparty computation does not require FHEBatch bootstrapping. I: A new framework for SIMD bootstrapping in polynomial modulusBatch bootstrapping. II: Bootstrapping in polynomial modulus only requires \(\tilde{O}(1)\) FHE multiplications in amortizationEfficient laconic cryptography from learning with errorsOn homomorphic secret sharing from polynomial-modulus LWERinocchio: SNARKs for ring arithmeticBreaking the \(O(\sqrt{n})\)-bit barrier: Byzantine agreement with polylog bits per partyRound-optimal oblivious transfer and MPC from computational CSIDHSender-binding key encapsulationAn upper bound on the covering radius of the logarithmic lattice for cyclotomic number fieldsOptimisations and tradeoffs for HElibPrivately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomnessBackward-leak uni-directional updatable encryption from (homomorphic) public key encryption\texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryptionMultikey Fully Homomorphic Encryption and ApplicationsLattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud EnvironmentHow to Encrypt with the LPN ProblemSeparating Models of Learning with Faulty TeachersUnnamed ItemCollusion Resistant Traitor Tracing from Learning with ErrorsEfficient and effective quantum compiling for entanglement-based machine learning on IBM Q devicesExplicit Hard Instances of the Shortest Vector ProblemDeterministic compression with uncertain priorsBoolean Functions for Homomorphic-Friendly Stream CiphersTwo Efficient Tag-Based Encryption Schemes on LatticesCompact Inner Product Encryption from LWECompact Hierarchical IBE from Lattices in the Standard ModelAn Experimental Study of Kannan’s Embedding Technique for the Search LWE ProblemBi-homomorphic Lattice-Based PRFs and Unidirectional Updatable EncryptionSimplified Revocable Hierarchical Identity-Based Encryption from LatticesLattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with EaseFractional LWE: A Nonlinear Variant of LWEGeneric Construction of Bounded-Collusion IBE via Table-Based ID-to-Key MapDiscrete Gaussian Distributions via Theta FunctionsParameterized Intractability of Even Set and Shortest Vector Problem from Gap-ETHRing Packing and Amortized FHEW BootstrappingImproved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and ApplicationsImproved (Hierarchical) Inner-Product Encryption from LatticesCCA-Secure Inner-Product Functional Encryption from Projective Hash FunctionsLP Solutions of Vectorial Integer Subset Sums – Cryptanalysis of Galbraith’s Binary Matrix LWESeparating IND-CPA and Circular Security for Unbounded Length Key CyclesProvably Secure NTRU Instances over Prime Cyclotomic RingsEfficient Compression of SIDH Public KeysOn Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEALUnnamed ItemUnnamed ItemParallel and Concurrent Security of the HB and HB +  ProtocolsCryptographic Functions from Worst-Case Complexity AssumptionsThe truth behind the myth of the folk theoremAlgorithmic problems in Engel groups and cryptographic applicationsConcurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice ProblemsExpanders with respect to Hadamard spaces and random graphsLimits of local algorithms over sparse random graphsLattice-Based Identification Schemes Secure Under Active AttacksWatermarking cryptographic functionalities from standard lattice assumptionsTopology-hiding computation on all graphsMulti-theorem preprocessing NIZKs from latticesParallel and concurrent security of the HB and \(HB^{+}\) protocolsTighter security proofs for GPV-IBE in the quantum random oracle modelImprovements in the analysis of Kannan's CVP algorithmFunctional Encryption for Cascade Automata (Extended Abstract)Giophantus distinguishing attack is a low dimensional learning with errors problemPredicting Lattice ReductionA CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard ModelAdaptive oblivious transfer with access control from lattice assumptionsA Novel Lattice-Based Ciphertext-Policy Attribute-Based Proxy Re-encryption for Cloud SharingMinicrypt primitives with algebraic structure and applicationsAdaptively secure MPC with sublinear communication complexityClassical Homomorphic Encryption for Quantum CircuitsThreshold Decryption and Zero-Knowledge Proofs for Lattice-Based CryptosystemsPublic-Key Encryption Schemes with Auxiliary InputsPublic-Key Cryptographic Primitives Provably as Secure as Subset SumUnnamed ItemOblivious Transfer Based on the McEliece AssumptionsAlgebraic Aspects of Solving Ring-LWE, Including Ring-Based Improvements in the Blum--Kalai--Wasserman AlgorithmMulti-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input SettingLattice-based revocable (hierarchical) IBE with decryption key exposure resistanceThe Complexity of Public-Key CryptographySeparating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors AssumptionA Note on Perfect Correctness by DerandomizationQuantum-Secure Symmetric-Key Cryptography Based on Hidden ShiftsLattice-Based SNARGs and Their Application to More Efficient Obfuscation