A decade of lattice cryptography
C Peikert - Foundations and trends® in theoretical computer …, 2016 - nowpublishers.com
Lattice-based cryptography is the use of conjectured hard problems on point lattices in Rn
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …
Indistinguishability obfuscation from well-founded assumptions
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile
programs into unintelligible ones while preserving functionality. It is a fascinating and …
programs into unintelligible ones while preserving functionality. It is a fascinating and …
Threshold cryptosystems from threshold fully homomorphic encryption
We develop a general approach to adding a threshold functionality to a large class of (non-
threshold) cryptographic schemes. A threshold functionality enables a secret key to be split …
threshold) cryptographic schemes. A threshold functionality enables a secret key to be split …
Succinct vector, polynomial, and functional commitments from lattices
Vector commitment schemes allow a user to commit to a vector of values x∈{0, 1} ℓ and
later, open up the commitment to a specific set of positions. Both the size of the commitment …
later, open up the commitment to a specific set of positions. Both the size of the commitment …
Indistinguishability obfuscation from constant-degree graded encoding schemes
H Lin - Advances in Cryptology–EUROCRYPT 2016: 35th …, 2016 - Springer
We construct an indistinguishability obfuscation (IO) scheme for all polynomial-size circuits
from constant-degree graded encoding schemes, assuming the existence of a …
from constant-degree graded encoding schemes, assuming the existence of a …
Circuit-ABE from LWE: unbounded attributes and semi-adaptive security
Z Brakerski, V Vaikuntanathan - Annual International Cryptology …, 2016 - Springer
We construct an LWE-based key-policy attribute-based encryption (ABE) scheme that
supports attributes of unbounded polynomial length. Namely, the size of the public …
supports attributes of unbounded polynomial length. Namely, the size of the public …
Lattice-based functional commitments: Fast verification and cryptanalysis
A functional commitment allows a user to commit to an input x∈{0, 1} ℓ and later open up the
commitment to a value y= f (x) with respect to some function f. In this work, we focus on …
commitment to a value y= f (x) with respect to some function f. In this work, we focus on …
Full quantum equivalence of group action DLog and CDH, and more
H Montgomery, M Zhandry - Journal of Cryptology, 2024 - Springer
Cryptographic group actions are a relaxation of standard cryptographic groups that have
less structure. This lack of structure allows them to be plausibly quantum resistant despite …
less structure. This lack of structure allows them to be plausibly quantum resistant despite …
Watermarking cryptographic capabilities
A watermarking scheme for programs embeds some information called a mark into a
program while preserving its functionality. No adversary can remove the mark without …
program while preserving its functionality. No adversary can remove the mark without …
Constraint-hiding constrained PRFs for NC from LWE
Abstract Constraint-hiding constrained PRFs (CHCPRFs), initially studied by Boneh, Lewi
and Wu (PKC 2017), are constrained PRFs where the constrained key hides the description …
and Wu (PKC 2017), are constrained PRFs where the constrained key hides the description …