Lattice-based FHE as secure as PKE

Z Brakerski, V Vaikuntanathan - Proceedings of the 5th conference on …, 2014 - dl.acm.org
… Closing this gap has been a central goal in the study of FHE … ” FHE can be as secure as any
other lattice-based public-key … ) are identical to Regev’s original lattice-based PKE [18], with …

Lattice-based key-sharing schemes: A survey

P Ravi, J Howe, A Chattopadhyay… - ACM Computing Surveys …, 2021 - dl.acm.org
… the evolution of the various lattice-based PKE, KEX and KEMs … done on physical security
of lattice-based schemes such as … various physical security aspects of lattice-based schemes …

Generic side-channel attacks on CCA-secure lattice-based PKE and KEMs

P Ravi, SS Roy, A Chattopadhyay… - IACR transactions on …, 2020 - tches.iacr.org
… attacks over IND-CCA secure lattice-based PKE/KEMs to the EM … secure lattice-based
PKE/KEMs. Our work reiterates the need for concrete masking countermeasures for lattice-based

Improved lattice-based CCA2-secure PKE in the standard model

J Zhang, Y Yu, S Fan, Z Zhang - Science China Information Sciences, 2020 - Springer
… PKEs from lattices, it is natural to ask: Can we directly construct a standard model CCA2-secure
PKE from lattices (possibly by carefully exploiting the rich algebraic properties of lattices)…

[PDF][PDF] Fully-Secure Lattice-Based IBE as Compact as PKE.

D Apon, X Fan, FH Liu - IACR Cryptol. ePrint Arch., 2016 - iacr.steepath.eu
… techniques to the GSW-FHE, the resulting scheme is matrix-multiplication-homomorphic. (Notably,
their scheme requires a circular security assumption to enable publicly encrypting …

Lattice-based fully dynamic multi-key FHE with short ciphertexts

Z Brakerski, R Perlman - Annual international cryptology conference, 2016 - Springer
… be secure, encrypting the secret key under the public key in MW needs to be secure (which
translates to a circular security … {PKE}\) is said to be weakly circular secure if it is secure even …

Lattice codes for lattice-based PKE

S Lyu, L Liu, C Ling, J Lai, H Chen - Designs, Codes and Cryptography, 2024 - Springer
… such as identity-based encryption and fully homomorphic encryption (FHE). … lattice-based
PKE/KEM, we aim to address these objectives and optimize the trade-off parameters of security

Lattice-based authenticated key exchange with tight security

J Pan, B Wagner, R Zeng - Annual International Cryptology Conference, 2023 - Springer
… selective-opening (BiSO) secure PKE. BiSO … a lattice-based AKE protocol with tight
security. We consider a multi-challenge setting defined by the “Single-Bit-Guess” (SBG) security

Generic side-channel attacks on CCA-secure lattice-based PKE and KEM schemes

P Ravi, SS Roy, A Chattopadhyay… - Cryptology ePrint …, 2019 - eprint.iacr.org
… them secure). … security of these lattice-based cryptographic schemes have received only
limited attention in [7,24]. In this paper we analyze side-channel security of several lattice-based

A lattice-based universal thresholdizer for cryptographic systems

D Boneh, R Gennaro, S Goldfeder, S Kim - Cryptology ePrint Archive, 2017 - eprint.iacr.org
… upon a latticebased fully-homomorphic encryption (FHE) … an existing CCA-secure public key
encryption (PKE) scheme [… first lattice-based (one-round) threshold CCA-secure PKE where …