A decade of lattice cryptography

C Peikert - Foundations and trends® in theoretical computer …, 2016 - nowpublishers.com
Lattice-based cryptography is the use of conjectured hard problems on point lattices in Rn
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …

Indistinguishability obfuscation from well-founded assumptions

A Jain, H Lin, A Sahai - Proceedings of the 53rd Annual ACM SIGACT …, 2021 - dl.acm.org
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile
programs into unintelligible ones while preserving functionality. It is a fascinating and …

Threshold cryptosystems from threshold fully homomorphic encryption

D Boneh, R Gennaro, S Goldfeder, A Jain… - Advances in Cryptology …, 2018 - Springer
We develop a general approach to adding a threshold functionality to a large class of (non-
threshold) cryptographic schemes. A threshold functionality enables a secret key to be split …

Succinct vector, polynomial, and functional commitments from lattices

H Wee, DJ Wu - Annual International Conference on the Theory and …, 2023 - Springer
Vector commitment schemes allow a user to commit to a vector of values x∈{0, 1} ℓ and
later, open up the commitment to a specific set of positions. Both the size of the commitment …

Indistinguishability obfuscation from constant-degree graded encoding schemes

H Lin - Advances in Cryptology–EUROCRYPT 2016: 35th …, 2016 - Springer
We construct an indistinguishability obfuscation (IO) scheme for all polynomial-size circuits
from constant-degree graded encoding schemes, assuming the existence of a …

Circuit-ABE from LWE: unbounded attributes and semi-adaptive security

Z Brakerski, V Vaikuntanathan - Annual International Cryptology …, 2016 - Springer
We construct an LWE-based key-policy attribute-based encryption (ABE) scheme that
supports attributes of unbounded polynomial length. Namely, the size of the public …

Lattice-based functional commitments: Fast verification and cryptanalysis

H Wee, DJ Wu - International Conference on the Theory and …, 2023 - Springer
A functional commitment allows a user to commit to an input x∈{0, 1} ℓ and later open up the
commitment to a value y= f (x) with respect to some function f. In this work, we focus on …

Full quantum equivalence of group action DLog and CDH, and more

H Montgomery, M Zhandry - Journal of Cryptology, 2024 - Springer
Cryptographic group actions are a relaxation of standard cryptographic groups that have
less structure. This lack of structure allows them to be plausibly quantum resistant despite …

Watermarking cryptographic capabilities

A Cohen, J Holmgren, R Nishimaki… - Proceedings of the forty …, 2016 - dl.acm.org
A watermarking scheme for programs embeds some information called a mark into a
program while preserving its functionality. No adversary can remove the mark without …

Constraint-hiding constrained PRFs for NC from LWE

R Canetti, Y Chen - Annual International Conference on the Theory and …, 2017 - Springer
Abstract Constraint-hiding constrained PRFs (CHCPRFs), initially studied by Boneh, Lewi
and Wu (PKC 2017), are constrained PRFs where the constrained key hides the description …