Survey on fully homomorphic encryption, theory, and applications

C Marcolla, V Sucasas, M Manzano… - Proceedings of the …, 2022 - ieeexplore.ieee.org
Data privacy concerns are increasing significantly in the context of the Internet of Things,
cloud services, edge computing, artificial intelligence applications, and other applications …

[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process

G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang… - 2022 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …

A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and graded encoding schemes

M Albrecht, S Bai, L Ducas - Annual International Cryptology Conference, 2016 - Springer
The subfield attack exploits the presence of a subfield to solve overstretched versions of the
NTRU assumption: norming the public key h down to a subfield may lead to an easier lattice …

FINAL: faster FHE instantiated with NTRU and LWE

C Bonte, I Iliashenko, J Park, HVL Pereira… - … Conference on the …, 2022 - Springer
The NTRU problem is a promising candidate to build efficient Fully Homomorphic Encryption
(FHE). However, all the existing proposals (eg LTV, YASHE) need so-called 'overstretched' …

Function-hiding inner product encryption is practical

S Kim, K Lewi, A Mandal, H Montgomery, A Roy… - … Conference on Security …, 2018 - Springer
In a functional encryption scheme, secret keys are associated with functions and ciphertexts
are associated with messages. Given a secret key for a function f, and a ciphertext for a …

Choosing parameters for NTRUEncrypt

J Hoffstein, J Pipher, JM Schanck, JH Silverman… - Cryptographers' Track at …, 2017 - Springer
We describe a method for generating parameter sets, and calculating security estimates, for
NTRUEncrypt. Our security analyses consider lattice attacks, the hybrid attack, subfield …

Revisiting lattice attacks on overstretched NTRU parameters

P Kirchner, PA Fouque - Annual International Conference on the Theory …, 2017 - Springer
Abstract In 2016, Albrecht, Bai and Ducas and independently Cheon, Jeong and Lee
presented very similar attacks to break the NTRU cryptosystem with larger modulus than in …

NTRU fatigue: how stretched is overstretched?

L Ducas, W van Woerden - … 2021: 27th International Conference on the …, 2021 - Springer
Until recently lattice reduction attacks on NTRU lattices were thought to behave similar as on
(ring-) LWE lattices with the same parameters. However several works (Albrecht-Bai-Ducas …

Security guidelines for implementing homomorphic encryption

JP Bossuat, R Cammarota, I Chillotti… - Cryptology ePrint …, 2024 - eprint.iacr.org
Abstract Fully Homomorphic Encryption (FHE) is a cryptographic primitive that allows
performing arbitrary operations on encrypted data. Since the conception of the idea in …

Optimal broadcast encryption from pairings and LWE

S Agrawal, S Yamada - Advances in Cryptology–EUROCRYPT 2020: 39th …, 2020 - Springer
Abstract Boneh, Waters and Zhandry (CRYPTO 2014) used multilinear maps to provide a
solution to the long-standing problem of public-key broadcast encryption (BE) where all …