Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks
TM Fernandez-Carames, P Fraga-Lamas - IEEE access, 2020 - ieeexplore.ieee.org
Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in
the last years and their use has been suggested for numerous applications due to their …
the last years and their use has been suggested for numerous applications due to their …
A decade of lattice cryptography
C Peikert - Foundations and trends® in theoretical computer …, 2016 - nowpublishers.com
Lattice-based cryptography is the use of conjectured hard problems on point lattices in Rn
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …
On the concrete hardness of learning with errors
The learning with errors (LWE) problem has become a central building block of modern
cryptographic constructions. This work collects and presents hardness results for concrete …
cryptographic constructions. This work collects and presents hardness results for concrete …
Frodo: Take off the ring! practical, quantum-secure key exchange from LWE
Lattice-based cryptography offers some of the most attractive primitives believed to be
resistant to quantum computers. Following increasing interest from both companies and …
resistant to quantum computers. Following increasing interest from both companies and …
Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based
We describe a comparatively simple fully homomorphic encryption (FHE) scheme based on
the learning with errors (LWE) problem. In previous LWE-based FHE schemes, multiplication …
the learning with errors (LWE) problem. In previous LWE-based FHE schemes, multiplication …
Planting undetectable backdoors in machine learning models
S Goldwasser, MP Kim… - 2022 IEEE 63rd …, 2022 - ieeexplore.ieee.org
Given the computational cost and technical expertise required to train machine learning
models, users may delegate the task of learning to a service provider. Delegation of learning …
models, users may delegate the task of learning to a service provider. Delegation of learning …
Efficient Fully Homomorphic Encryption from (Standard)
Z Brakerski, V Vaikuntanathan - SIAM Journal on computing, 2014 - SIAM
A fully homomorphic encryption (FHE) scheme allows anyone to transform an encryption of
a message, m, into an encryption of any (efficient) function of that message, f(m), without …
a message, m, into an encryption of any (efficient) function of that message, f(m), without …
Trapdoors for lattices: Simpler, tighter, faster, smaller
D Micciancio, C Peikert - Annual International Conference on the Theory …, 2012 - Springer
We give new methods for generating and using “strong trapdoors” in cryptographic lattices,
which are simultaneously simple, efficient, easy to implement (even in parallel), and …
which are simultaneously simple, efficient, easy to implement (even in parallel), and …
On ideal lattices and learning with errors over rings
V Lyubashevsky, C Peikert, O Regev - … on the Theory and Applications of …, 2010 - Springer
The “learning with errors”(LWE) problem is to distinguish random linear equations, which
have been perturbed by a small amount of noise, from truly uniform ones. The problem has …
have been perturbed by a small amount of noise, from truly uniform ones. The problem has …
Lattice signatures without trapdoors
V Lyubashevsky - Annual International Conference on the Theory and …, 2012 - Springer
We provide an alternative method for constructing lattice-based digital signatures which
does not use the “hash-and-sign” methodology of Gentry, Peikert, and Vaikuntanathan …
does not use the “hash-and-sign” methodology of Gentry, Peikert, and Vaikuntanathan …