Lattice-based FHE as secure as PKE
Z Brakerski, V Vaikuntanathan - Proceedings of the 5th conference on …, 2014 - dl.acm.org
… Closing this gap has been a central goal in the study of FHE … ” FHE can be as secure as any
other lattice-based public-key … ) are identical to Regev’s original lattice-based PKE [18], with …
other lattice-based public-key … ) are identical to Regev’s original lattice-based PKE [18], with …
Lattice-based key-sharing schemes: A survey
… the evolution of the various lattice-based PKE, KEX and KEMs … done on physical security
of lattice-based schemes such as … various physical security aspects of lattice-based schemes …
of lattice-based schemes such as … various physical security aspects of lattice-based schemes …
Generic side-channel attacks on CCA-secure lattice-based PKE and KEMs
… attacks over IND-CCA secure lattice-based PKE/KEMs to the EM … secure lattice-based
PKE/KEMs. Our work reiterates the need for concrete masking countermeasures for lattice-based …
PKE/KEMs. Our work reiterates the need for concrete masking countermeasures for lattice-based …
Improved lattice-based CCA2-secure PKE in the standard model
J Zhang, Y Yu, S Fan, Z Zhang - Science China Information Sciences, 2020 - Springer
… PKEs from lattices, it is natural to ask: Can we directly construct a standard model CCA2-secure
PKE from lattices (possibly by carefully exploiting the rich algebraic properties of lattices)…
PKE from lattices (possibly by carefully exploiting the rich algebraic properties of lattices)…
[PDF][PDF] Fully-Secure Lattice-Based IBE as Compact as PKE.
… techniques to the GSW-FHE, the resulting scheme is matrix-multiplication-homomorphic. (Notably,
their scheme requires a circular security assumption to enable publicly encrypting …
their scheme requires a circular security assumption to enable publicly encrypting …
Lattice-based fully dynamic multi-key FHE with short ciphertexts
Z Brakerski, R Perlman - Annual international cryptology conference, 2016 - Springer
… be secure, encrypting the secret key under the public key in MW needs to be secure (which
translates to a circular security … {PKE}\) is said to be weakly circular secure if it is secure even …
translates to a circular security … {PKE}\) is said to be weakly circular secure if it is secure even …
Lattice codes for lattice-based PKE
… such as identity-based encryption and fully homomorphic encryption (FHE). … lattice-based
PKE/KEM, we aim to address these objectives and optimize the trade-off parameters of security …
PKE/KEM, we aim to address these objectives and optimize the trade-off parameters of security …
Lattice-based authenticated key exchange with tight security
… selective-opening (BiSO) secure PKE. BiSO … a lattice-based AKE protocol with tight
security. We consider a multi-challenge setting defined by the “Single-Bit-Guess” (SBG) security …
security. We consider a multi-challenge setting defined by the “Single-Bit-Guess” (SBG) security …
Generic side-channel attacks on CCA-secure lattice-based PKE and KEM schemes
… them secure). … security of these lattice-based cryptographic schemes have received only
limited attention in [7,24]. In this paper we analyze side-channel security of several lattice-based …
limited attention in [7,24]. In this paper we analyze side-channel security of several lattice-based …
A lattice-based universal thresholdizer for cryptographic systems
… upon a latticebased fully-homomorphic encryption (FHE) … an existing CCA-secure public key
encryption (PKE) scheme [… first lattice-based (one-round) threshold CCA-secure PKE where …
encryption (PKE) scheme [… first lattice-based (one-round) threshold CCA-secure PKE where …