Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks

TM Fernandez-Carames, P Fraga-Lamas - IEEE access, 2020 - ieeexplore.ieee.org
Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in
the last years and their use has been suggested for numerous applications due to their …

A decade of lattice cryptography

C Peikert - Foundations and trends® in theoretical computer …, 2016 - nowpublishers.com
Lattice-based cryptography is the use of conjectured hard problems on point lattices in Rn
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …

On the concrete hardness of learning with errors

MR Albrecht, R Player, S Scott - Journal of Mathematical Cryptology, 2015 - degruyter.com
The learning with errors (LWE) problem has become a central building block of modern
cryptographic constructions. This work collects and presents hardness results for concrete …

Frodo: Take off the ring! practical, quantum-secure key exchange from LWE

J Bos, C Costello, L Ducas, I Mironov… - Proceedings of the …, 2016 - dl.acm.org
Lattice-based cryptography offers some of the most attractive primitives believed to be
resistant to quantum computers. Following increasing interest from both companies and …

Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based

C Gentry, A Sahai, B Waters - … in Cryptology–CRYPTO 2013: 33rd Annual …, 2013 - Springer
We describe a comparatively simple fully homomorphic encryption (FHE) scheme based on
the learning with errors (LWE) problem. In previous LWE-based FHE schemes, multiplication …

Planting undetectable backdoors in machine learning models

S Goldwasser, MP Kim… - 2022 IEEE 63rd …, 2022 - ieeexplore.ieee.org
Given the computational cost and technical expertise required to train machine learning
models, users may delegate the task of learning to a service provider. Delegation of learning …

Efficient Fully Homomorphic Encryption from (Standard)

Z Brakerski, V Vaikuntanathan - SIAM Journal on computing, 2014 - SIAM
A fully homomorphic encryption (FHE) scheme allows anyone to transform an encryption of
a message, m, into an encryption of any (efficient) function of that message, f(m), without …

Trapdoors for lattices: Simpler, tighter, faster, smaller

D Micciancio, C Peikert - Annual International Conference on the Theory …, 2012 - Springer
We give new methods for generating and using “strong trapdoors” in cryptographic lattices,
which are simultaneously simple, efficient, easy to implement (even in parallel), and …

On ideal lattices and learning with errors over rings

V Lyubashevsky, C Peikert, O Regev - … on the Theory and Applications of …, 2010 - Springer
The “learning with errors”(LWE) problem is to distinguish random linear equations, which
have been perturbed by a small amount of noise, from truly uniform ones. The problem has …

Lattice signatures without trapdoors

V Lyubashevsky - Annual International Conference on the Theory and …, 2012 - Springer
We provide an alternative method for constructing lattice-based digital signatures which
does not use the “hash-and-sign” methodology of Gentry, Peikert, and Vaikuntanathan …