Survey on fully homomorphic encryption, theory, and applications
Data privacy concerns are increasing significantly in the context of the Internet of Things,
cloud services, edge computing, artificial intelligence applications, and other applications …
cloud services, edge computing, artificial intelligence applications, and other applications …
[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …
publickey cryptographic algorithms through a public, competition-like process. The new …
A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and graded encoding schemes
The subfield attack exploits the presence of a subfield to solve overstretched versions of the
NTRU assumption: norming the public key h down to a subfield may lead to an easier lattice …
NTRU assumption: norming the public key h down to a subfield may lead to an easier lattice …
FINAL: faster FHE instantiated with NTRU and LWE
The NTRU problem is a promising candidate to build efficient Fully Homomorphic Encryption
(FHE). However, all the existing proposals (eg LTV, YASHE) need so-called 'overstretched' …
(FHE). However, all the existing proposals (eg LTV, YASHE) need so-called 'overstretched' …
Function-hiding inner product encryption is practical
In a functional encryption scheme, secret keys are associated with functions and ciphertexts
are associated with messages. Given a secret key for a function f, and a ciphertext for a …
are associated with messages. Given a secret key for a function f, and a ciphertext for a …
Choosing parameters for NTRUEncrypt
We describe a method for generating parameter sets, and calculating security estimates, for
NTRUEncrypt. Our security analyses consider lattice attacks, the hybrid attack, subfield …
NTRUEncrypt. Our security analyses consider lattice attacks, the hybrid attack, subfield …
Revisiting lattice attacks on overstretched NTRU parameters
P Kirchner, PA Fouque - Annual International Conference on the Theory …, 2017 - Springer
Abstract In 2016, Albrecht, Bai and Ducas and independently Cheon, Jeong and Lee
presented very similar attacks to break the NTRU cryptosystem with larger modulus than in …
presented very similar attacks to break the NTRU cryptosystem with larger modulus than in …
NTRU fatigue: how stretched is overstretched?
L Ducas, W van Woerden - … 2021: 27th International Conference on the …, 2021 - Springer
Until recently lattice reduction attacks on NTRU lattices were thought to behave similar as on
(ring-) LWE lattices with the same parameters. However several works (Albrecht-Bai-Ducas …
(ring-) LWE lattices with the same parameters. However several works (Albrecht-Bai-Ducas …
Security guidelines for implementing homomorphic encryption
JP Bossuat, R Cammarota, I Chillotti… - Cryptology ePrint …, 2024 - eprint.iacr.org
Abstract Fully Homomorphic Encryption (FHE) is a cryptographic primitive that allows
performing arbitrary operations on encrypted data. Since the conception of the idea in …
performing arbitrary operations on encrypted data. Since the conception of the idea in …
Optimal broadcast encryption from pairings and LWE
Abstract Boneh, Waters and Zhandry (CRYPTO 2014) used multilinear maps to provide a
solution to the long-standing problem of public-key broadcast encryption (BE) where all …
solution to the long-standing problem of public-key broadcast encryption (BE) where all …