Cianfriglia, Marco; Onofri, Elia; Pedicini, Marco \(\mathrm{mR}_{\mathrm{LWE}}\)-CP-ABE: a revocable CP-ABE for post-quantum cryptography. (English) Zbl 07819568 J. Math. Cryptol. 18, Article ID 20230026, 22 p. (2024). MSC: 94A60 68P25 68Q25 81P94 PDFBibTeX XMLCite \textit{M. Cianfriglia} et al., J. Math. Cryptol. 18, Article ID 20230026, 22 p. (2024; Zbl 07819568) Full Text: DOI OA License
Xiao, Kaifeng; Chen, Xinjian; Li, Hongbo; Huang, Jianye; Susilo, Willy; Huang, Qiong A fully secure lattice-based signcryption with designated equality test in standard model. (English) Zbl 07804484 Inf. Sci. 658, Article ID 120015, 20 p. (2024). MSC: 94A60 68T07 PDFBibTeX XMLCite \textit{K. Xiao} et al., Inf. Sci. 658, Article ID 120015, 20 p. (2024; Zbl 07804484) Full Text: DOI
Zhao, Feixiang; Weng, Jian; Xie, Wenli; Li, Ming; Weng, Jiasi HRA-secure attribute-based threshold proxy re-encryption from lattices. (English) Zbl 07803414 Inf. Sci. 655, Article ID 119900, 16 p. (2024). MSC: 94A60 68P25 68M25 PDFBibTeX XMLCite \textit{F. Zhao} et al., Inf. Sci. 655, Article ID 119900, 16 p. (2024; Zbl 07803414) Full Text: DOI
Jain, Aayush; Lin, Huijia; Sahai, Amit Indistinguishability obfuscation. (English) Zbl 07821711 Beliaev, Dmitry (ed.) et al., International congress of mathematicians 2022, ICM 2022, Helsinki, Finland, virtual, July 6–14, 2022. Volume 6. Sections 12–14. Berlin: European Mathematical Society (EMS). 4762-4798 (2023). MSC: 94A60 68Q17 68Q17 68N20 11H99 11T71 PDFBibTeX XMLCite \textit{A. Jain} et al., in: International congress of mathematicians 2022, ICM 2022, Helsinki, Finland, virtual, July 6--14, 2022. Volume 6. Sections 12--14. Berlin: European Mathematical Society (EMS). 4762--4798 (2023; Zbl 07821711) Full Text: DOI OA License
Newton, Parker; Richelson, Silas A lower bound for proving hardness of learning with rounding with polynomial modulus. (English) Zbl 07800252 Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part V. Cham: Springer. Lect. Notes Comput. Sci. 14085, 805-835 (2023). MSC: 94A60 68T07 PDFBibTeX XMLCite \textit{P. Newton} and \textit{S. Richelson}, Lect. Notes Comput. Sci. 14085, 805--835 (2023; Zbl 07800252) Full Text: DOI
Bae, Youngjin; Cheon, Jung Hee; Kim, Jaehyung; Park, Jai Hyun; Stehlé, Damien HERMES: efficient ring packing using MLWE ciphertexts and application to transciphering. (English) Zbl 07800205 Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 14084, 37-69 (2023). MSC: 94A60 68P25 68T07 PDFBibTeX XMLCite \textit{Y. Bae} et al., Lect. Notes Comput. Sci. 14084, 37--69 (2023; Zbl 07800205) Full Text: DOI
Ducas, Léo; Pulles, Ludo N. Does the dual-sieve attack on learning with errors even work? (English) Zbl 07799251 Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14083, 37-69 (2023). MSC: 94A60 65T50 68T07 68P25 68T07 PDFBibTeX XMLCite \textit{L. Ducas} and \textit{L. N. Pulles}, Lect. Notes Comput. Sci. 14083, 37--69 (2023; Zbl 07799251) Full Text: DOI
Sudo, Kyohei; Tezuka, Masayuki; Hara, Keisuke; Yoshida, Yusuke Quantum search-to-decision reduction for the LWE problem. (English) Zbl 07798843 El Mrabet, Nadia (ed.) et al., Progress in cryptology – AFRICACRYPT 2023. 14th international conference on cryptology in Africa, Sousse, Tunisia, July 19–21, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 14064, 395-413 (2023). MSC: 94A60 68T07 81P94 68Q25 PDFBibTeX XMLCite \textit{K. Sudo} et al., Lect. Notes Comput. Sci. 14064, 395--413 (2023; Zbl 07798843) Full Text: DOI
Gärtner, Joel Concrete security from worst-case to average-case lattice reductions. (English) Zbl 07798841 El Mrabet, Nadia (ed.) et al., Progress in cryptology – AFRICACRYPT 2023. 14th international conference on cryptology in Africa, Sousse, Tunisia, July 19–21, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 14064, 344-369 (2023). MSC: 94A60 81P68 11H06 PDFBibTeX XMLCite \textit{J. Gärtner}, Lect. Notes Comput. Sci. 14064, 344--369 (2023; Zbl 07798841) Full Text: DOI
Mahadev, Urmila Classical homomorphic encryption for quantum circuits. (English) Zbl 07780699 SIAM J. Comput. 52, No. 6, FOCS18-189-FOCS18-215 (2023). MSC: 81P68 68Q12 81P94 94A60 PDFBibTeX XMLCite \textit{U. Mahadev}, SIAM J. Comput. 52, No. 6, FOCS18--189-FOCS18--215 (2023; Zbl 07780699) Full Text: DOI
Döttling, Nico; Kolonelos, Dimitris; Lai, Russell W. F.; Lin, Chuanwei; Malavolta, Giulio; Rahimi, Ahmadreza Efficient laconic cryptography from learning with errors. (English) Zbl 1528.94046 Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14006, 417-446 (2023). MSC: 94A60 68P25 68T05 PDFBibTeX XMLCite \textit{N. Döttling} et al., Lect. Notes Comput. Sci. 14006, 417--446 (2023; Zbl 1528.94046) Full Text: DOI
Boudgoust, Katharina; Jeudy, Corentin; Roux-Langlois, Adeline; Wen, Weiqiang Entropic hardness of Module-LWE from module-NTRU. (English) Zbl 1519.94061 Isobe, Takanori (ed.) et al., Progress in cryptology – INDOCRYPT 2022. 23rd international conference on cryptology in India, Kolkata, India, December 11–14, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13774, 78-99 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Boudgoust} et al., Lect. Notes Comput. Sci. 13774, 78--99 (2023; Zbl 1519.94061) Full Text: DOI
Bitansky, Nir; Choudhuri, Arka Rai; Holmgren, Justin; Kamath, Chethan; Lombardi, Alex; Paneth, Omer; Rothblum, Ron D. PPAD is as hard as LWE and iterated squaring. (English) Zbl 1519.94057 Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13748, 593-622 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Bitansky} et al., Lect. Notes Comput. Sci. 13748, 593--622 (2023; Zbl 1519.94057) Full Text: DOI
Bogdanov, Andrej; Cueto Noval, Miguel; Hoffmann, Charlotte; Rosen, Alon Public-key encryption from homogeneous CLWE. (English) Zbl 1519.94059 Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13748, 565-592 (2023). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{A. Bogdanov} et al., Lect. Notes Comput. Sci. 13748, 565--592 (2023; Zbl 1519.94059) Full Text: DOI
Sarkar, Palash; Singha, Subhadip Classical reduction of gap SVP to LWE: a concrete security analysis. (English) Zbl 1517.94151 Adv. Math. Commun. 17, No. 2, 484-499 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Sarkar} and \textit{S. Singha}, Adv. Math. Commun. 17, No. 2, 484--499 (2023; Zbl 1517.94151) Full Text: DOI
Attrapadung, Nuttapong; Hanaoka, Goichiro; Hiromasa, Ryo; Matsuda, Takahiro; Schuldt, Jacob C. N. Maliciously circuit-private multi-key FHE and MPC based on LWE. (English) Zbl 1512.94059 Des. Codes Cryptography 91, No. 5, 1645-1684 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Attrapadung} et al., Des. Codes Cryptography 91, No. 5, 1645--1684 (2023; Zbl 1512.94059) Full Text: DOI
Zheng, Zhiyong; Tian, Kun; Liu, Fengxia Modern cryptography. Volume 2. A classical introduction to informational and mathematical principle. (English) Zbl 1520.94001 Financial Mathematics and Fintech. Singapore: Springer (ISBN 978-981-19-7643-8/hbk; 978-981-19-7646-9/pbk; 978-981-19-7644-5/ebook). xi, 191 p., open access (2023). Reviewer: Jaak Henno (Tallinn) MSC: 94-01 94A60 94A62 94A24 94A17 94A15 68Q25 94B99 14G50 PDFBibTeX XMLCite \textit{Z. Zheng} et al., Modern cryptography. Volume 2. A classical introduction to informational and mathematical principle. Singapore: Springer (2023; Zbl 1520.94001) Full Text: DOI
Boudgoust, Katharina; Jeudy, Corentin; Roux-Langlois, Adeline; Wen, Weiqiang On the hardness of module learning with errors with short distributions. (English) Zbl 1509.94069 J. Cryptology 36, No. 1, Paper No. 1, 70 p. (2023). Reviewer: Vladimír Lacko (Košice) MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{K. Boudgoust} et al., J. Cryptology 36, No. 1, Paper No. 1, 70 p. (2023; Zbl 1509.94069) Full Text: DOI
Bermudo Mera, Jose Maria; Karmakar, Angshuman; Marc, Tilen; Soleimanian, Azam Efficient lattice-based inner-product functional encryption. (English) Zbl 1519.94049 Hanaoka, Goichiro (ed.) et al., Public-key cryptography – PKC 2022. 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8–11, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13178, 163-193 (2022). MSC: 94A60 68P25 68N20 PDFBibTeX XMLCite \textit{J. M. Bermudo Mera} et al., Lect. Notes Comput. Sci. 13178, 163--193 (2022; Zbl 1519.94049) Full Text: DOI
Le, Huy Quoc; Duong, Dung Hoang; Susilo, Willy; Pieprzyk, Josef Spatial encryption revisited: from delegatable multiple inner product encryption and more. (English) Zbl 1523.68026 Atluri, Vijayalakshmi (ed.) et al., Computer security – ESORICS 2022. 27th European symposium on research in computer security, Copenhagen, Denmark, September 26–30, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13554, 283-302 (2022). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{H. Q. Le} et al., Lect. Notes Comput. Sci. 13554, 283--302 (2022; Zbl 1523.68026) Full Text: DOI
Fang, Boyue; Wang, Weize; Zhao, Yunlei Tight analysis of decryption failure probability of Kyber in reality. (English) Zbl 1512.94083 Alcaraz, Cristina (ed.) et al., Information and communications security. 24th international conference, ICICS 2022, Canterbury, UK, September 5–8, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13407, 148-160 (2022). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{B. Fang} et al., Lect. Notes Comput. Sci. 13407, 148--160 (2022; Zbl 1512.94083) Full Text: DOI
Ren, Peixin; Gu, Xiaozhuo Practical post-quantum password-authenticated key exchange based-on module-lattice. (English) Zbl 07628047 Park, Jong Hwan (ed.) et al., Information security and cryptology – ICISC 2021. 24th international conference, Seoul, South Korea, December 1–3, 2021. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13218, 137-156 (2022). MSC: 68M25 68P25 94A60 PDFBibTeX XMLCite \textit{P. Ren} and \textit{X. Gu}, Lect. Notes Comput. Sci. 13218, 137--156 (2022; Zbl 07628047) Full Text: DOI
Kumar, Rajendra; Nguyen, Khoa Covert authentication from lattices. (English) Zbl 1512.94114 Ateniese, Giuseppe (ed.) et al., Applied cryptography and network security. 20th international conference, ACNS 2022, Rome, Italy, June 20–23, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13269, 480-500 (2022). MSC: 94A62 94A60 68P25 PDFBibTeX XMLCite \textit{R. Kumar} and \textit{K. Nguyen}, Lect. Notes Comput. Sci. 13269, 480--500 (2022; Zbl 1512.94114) Full Text: DOI
Jain, Aayush; Lin, Huijia; Sahai, Amit Indistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\). (English) Zbl 1496.94052 Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13275, 670-699 (2022). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{A. Jain} et al., Lect. Notes Comput. Sci. 13275, 670--699 (2022; Zbl 1496.94052) Full Text: DOI
Gentry, Craig; Halevi, Shai; Lyubashevsky, Vadim Practical non-interactive publicly verifiable secret sharing with thousands of parties. (English) Zbl 1496.94078 Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13275, 458-487 (2022). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{C. Gentry} et al., Lect. Notes Comput. Sci. 13275, 458--487 (2022; Zbl 1496.94078) Full Text: DOI
Grover, Charles; Mendelsohn, Andrew; Ling, Cong; Vehkalahti, Roope Non-commutative ring learning with errors from cyclic algebras. (English) Zbl 1497.94096 J. Cryptology 35, No. 3, Paper No. 22, 67 p. (2022). MSC: 94A60 94A62 81P94 PDFBibTeX XMLCite \textit{C. Grover} et al., J. Cryptology 35, No. 3, Paper No. 22, 67 p. (2022; Zbl 1497.94096) Full Text: DOI arXiv
Blanco-Chacón, Iván On the RLWE/PLWE equivalence for cyclotomic number fields. (English) Zbl 1481.11070 Appl. Algebra Eng. Commun. Comput. 33, No. 1, 53-71 (2022). MSC: 11H71 11R18 94A60 PDFBibTeX XMLCite \textit{I. Blanco-Chacón}, Appl. Algebra Eng. Commun. Comput. 33, No. 1, 53--71 (2022; Zbl 1481.11070) Full Text: DOI arXiv
Guo, Siyao; Kamath, Pritish; Rosen, Alon; Sotiraki, Katerina Limits on the efficiency of (ring) LWE-based non-interactive key exchange. (English) Zbl 1479.94183 J. Cryptology 35, No. 1, Paper No. 1, 24 p. (2022). Reviewer: Roberto Civino (L’Aquila) MSC: 94A60 PDFBibTeX XMLCite \textit{S. Guo} et al., J. Cryptology 35, No. 1, Paper No. 1, 24 p. (2022; Zbl 1479.94183) Full Text: DOI
Demarest, Luke; Fuller, Benjamin; Russell, Alexander Code offset in the exponent. (English) Zbl 1517.94090 Tessaro, Stefano (ed.), 2nd conference on information-theoretic cryptography. ITC 2021, July 23–26, 2021, virtual conference. Wadern: Schloss Dagstuhl – Leibniz-Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 199, Article 15, 23 p. (2021). MSC: 94A60 94B99 68P25 PDFBibTeX XMLCite \textit{L. Demarest} et al., LIPIcs -- Leibniz Int. Proc. Inform. 199, Article 15, 23 p. (2021; Zbl 1517.94090) Full Text: DOI
Guo, Qian; Johansson, Thomas Faster dual lattice attacks for solving LWE with applications to CRYSTALS. (English) Zbl 1514.94093 Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 13093, 33-62 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{Q. Guo} and \textit{T. Johansson}, Lect. Notes Comput. Sci. 13093, 33--62 (2021; Zbl 1514.94093) Full Text: DOI
Cheon, Jung Hee; Kim, Dongwoo; Kim, Duhyeong; Lee, Joohee; Shin, Junbum; Song, Yongsoo Lattice-based secure biometric authentication for Hamming distance. (English) Zbl 1522.94051 Baek, Joonsang (ed.) et al., Information security and privacy. 26th Australasian conference, ACISP 2021, virtual event, December 1–3, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13083, 653-672 (2021). MSC: 94A60 94A62 68T05 PDFBibTeX XMLCite \textit{J. H. Cheon} et al., Lect. Notes Comput. Sci. 13083, 653--672 (2021; Zbl 1522.94051) Full Text: DOI
Dutta, Priyanka; Susilo, Willy; Dung Hoang Duong; Roy, Partha Sarathi Puncturable identity-based encryption from lattices. (English) Zbl 1521.94041 Baek, Joonsang (ed.) et al., Information security and privacy. 26th Australasian conference, ACISP 2021, virtual event, December 1–3, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13083, 571-589 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Dutta} et al., Lect. Notes Comput. Sci. 13083, 571--589 (2021; Zbl 1521.94041) Full Text: DOI
Hesse, Julia; Hofheinz, Dennis; Kohl, Lisa; Langrehr, Roman Towards tight adaptive security of non-interactive key exchange. (English) Zbl 1511.94110 Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13044, 286-316 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Hesse} et al., Lect. Notes Comput. Sci. 13044, 286--316 (2021; Zbl 1511.94110) Full Text: DOI
Abla, Parhat; Liu, Feng-Hao; Wang, Han; Wang, Zhedong Ring-based identity based encryption – asymptotically shorter MPK and tighter security. (English) Zbl 1511.94035 Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13044, 157-187 (2021). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{P. Abla} et al., Lect. Notes Comput. Sci. 13044, 157--187 (2021; Zbl 1511.94035) Full Text: DOI
Devadas, Lalita; Quach, Willy; Vaikuntanathan, Vinod; Wee, Hoeteck; Wichs, Daniel Succinct LWE sampling, random polynomials, and obfuscation. (English) Zbl 1511.94087 Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13043, 256-287 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Devadas} et al., Lect. Notes Comput. Sci. 13043, 256--287 (2021; Zbl 1511.94087) Full Text: DOI
Chardouvelis, Orestis; Döttling, Nico; Malavolta, Giulio Rate-1 quantum fully homomorphic encryption. (English) Zbl 1512.94071 Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13042, 149-176 (2021). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{O. Chardouvelis} et al., Lect. Notes Comput. Sci. 13042, 149--176 (2021; Zbl 1512.94071) Full Text: DOI
Faller, Sebastian H.; Baumer, Pascal; Klooß, Michael; Koch, Alexander; Ottenhues, Astrid; Raiber, Markus Black-box accumulation based on lattices. (English) Zbl 1492.94101 Paterson, Maura B. (ed.), Cryptography and coding. 18th IMA international conference, IMACC 2021, virtual event, December 14–15, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13129, 220-246 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{S. H. Faller} et al., Lect. Notes Comput. Sci. 13129, 220--246 (2021; Zbl 1492.94101) Full Text: DOI
Susilo, Willy; Dutta, Priyanka; Dung Hoang Duong; Roy, Partha Sarathi Lattice-based HRA-secure attribute-based proxy re-encryption in standard model. (English) Zbl 1498.68059 Bertino, Elisa (ed.) et al., Computer security – ESORICS 2021. 26th European symposium on research in computer security, Darmstadt, Germany, October 4–8, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12973, 169-191 (2021). MSC: 68M25 68P25 94A60 PDFBibTeX XMLCite \textit{W. Susilo} et al., Lect. Notes Comput. Sci. 12973, 169--191 (2021; Zbl 1498.68059) Full Text: DOI
Liang, Xiaojian; Weng, Jian; Yang, Anjia; Yao, Lisha; Jiang, Zike; Wu, Zhenghao Attribute-based conditional proxy re-encryption in the standard model under LWE. (English) Zbl 1498.68054 Bertino, Elisa (ed.) et al., Computer security – ESORICS 2021. 26th European symposium on research in computer security, Darmstadt, Germany, October 4–8, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12973, 147-168 (2021). MSC: 68M25 68P25 94A60 PDFBibTeX XMLCite \textit{X. Liang} et al., Lect. Notes Comput. Sci. 12973, 147--168 (2021; Zbl 1498.68054) Full Text: DOI
Bindel, Nina; Stebila, Douglas; Veitch, Shannon Improved attacks against key reuse in learning with errors key exchange. (English) Zbl 1491.94039 Longa, Patrick (ed.) et al., Progress in cryptology – LATINCRYPT 2021. 7th international conference on cryptology and information security in Latin America, Bogotá, Colombia, October 6–8, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12912, 168-188 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Bindel} et al., Lect. Notes Comput. Sci. 12912, 168--188 (2021; Zbl 1491.94039) Full Text: DOI
Wu, Zhenghao; Weng, Jian; Yang, Anjia; Yao, Lisha; Liang, Xiaojian; Jiang, Zike; Wen, Jinghang Efficient and fully secure lattice-based IBE with equality test. (English) Zbl 1500.94056 Gao, Debin (ed.) et al., Information and communications security. 23rd international conference, ICICS 2021, Chongqing, China, November 19–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12919, 301-318 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{Z. Wu} et al., Lect. Notes Comput. Sci. 12919, 301--318 (2021; Zbl 1500.94056) Full Text: DOI
Zhu, Yiming; Liu, Zhen; Pan, Yanbin When NTT meets Karatsuba: preprocess-then-NTT technique revisited. (English) Zbl 1500.94064 Gao, Debin (ed.) et al., Information and communications security. 23rd international conference, ICICS 2021, Chongqing, China, November 19–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12919, 249-264 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Zhu} et al., Lect. Notes Comput. Sci. 12919, 249--264 (2021; Zbl 1500.94064) Full Text: DOI
Agrawal, Shweta; Maitra, Monosij; Vempati, Narasimha Sai; Yamada, Shota Functional encryption for Turing machines with dynamic bounded collusion from LWE. (English) Zbl 1489.94083 Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 12828, 239-269 (2021). MSC: 94A60 68Q04 PDFBibTeX XMLCite \textit{S. Agrawal} et al., Lect. Notes Comput. Sci. 12828, 239--269 (2021; Zbl 1489.94083) Full Text: DOI
Masuda, Masahiro; Kameyama, Yukiyoshi FFT program generation for ring LWE-based cryptography. (English) Zbl 1496.94060 Nakanishi, Toru (ed.) et al., Advances in information and computer security. 16th international workshop on security, IWSEC 2021, virtual event, September 8–10, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12835, 151-171 (2021). MSC: 94A60 65T50 PDFBibTeX XMLCite \textit{M. Masuda} and \textit{Y. Kameyama}, Lect. Notes Comput. Sci. 12835, 151--171 (2021; Zbl 1496.94060) Full Text: DOI
Chatterjee, Rohit; Garg, Sanjam; Hajiabadi, Mohammad; Khurana, Dakshita; Liang, Xiao; Malavolta, Giulio; Pandey, Omkant; Shiehian, Sina Compact ring signatures from learning with errors. (English) Zbl 1485.94134 Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12825, 282-312 (2021). MSC: 94A62 94A60 81P94 PDFBibTeX XMLCite \textit{R. Chatterjee} et al., Lect. Notes Comput. Sci. 12825, 282--312 (2021; Zbl 1485.94134) Full Text: DOI
Chen, Hao; Dai, Wei; Kim, Miran; Song, Yongsoo Efficient homomorphic conversion between (ring) LWE ciphertexts. (English) Zbl 1491.94042 Sako, Kazue (ed.) et al., Applied cryptography and network security. 19th international conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12726, 460-479 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Chen} et al., Lect. Notes Comput. Sci. 12726, 460--479 (2021; Zbl 1491.94042) Full Text: DOI
Boudgoust, Katharina; Jeudy, Corentin; Roux-Langlois, Adeline; Wen, Weiqiang On the hardness of module-LWE with binary secret. (English) Zbl 1479.94133 Paterson, Kenneth G. (ed.), Topics in cryptology – CT-RSA 2021. Cryptographers’ track at the RSA conference 2021, virtual event, May 17–20, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12704, 503-526 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Boudgoust} et al., Lect. Notes Comput. Sci. 12704, 503--526 (2021; Zbl 1479.94133) Full Text: DOI HAL
Yun, Kelly; Xue, Rui Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption. (English) Zbl 1479.94275 Wu, Yongdong (ed.) et al., Information security and cryptology. 16th international conference, Inscrypt 2020, Guangzhou, China, December 11–14, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12612, 133-147 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Yun} and \textit{R. Xue}, Lect. Notes Comput. Sci. 12612, 133--147 (2021; Zbl 1479.94275) Full Text: DOI
Wee, Hoeteck; Wichs, Daniel Candidate obfuscation via oblivious LWE sampling. (English) Zbl 1479.94270 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12698, 127-156 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Wee} and \textit{D. Wichs}, Lect. Notes Comput. Sci. 12698, 127--156 (2021; Zbl 1479.94270) Full Text: DOI
Sehrawat, Vipin Singh; Yeo, Foo Yee; Desmedt, Yvo Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification. (English) Zbl 1517.94205 Theor. Comput. Sci. 886, 106-138 (2021). MSC: 94A62 94A60 05D05 PDFBibTeX XMLCite \textit{V. S. Sehrawat} et al., Theor. Comput. Sci. 886, 106--138 (2021; Zbl 1517.94205) Full Text: DOI arXiv
Luo, Fucai; Al-Kuwari, Saif Revocable attribute-based proxy re-encryption. (English) Zbl 1482.94053 J. Math. Cryptol. 15, 465-482 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{F. Luo} and \textit{S. Al-Kuwari}, J. Math. Cryptol. 15, 465--482 (2021; Zbl 1482.94053) Full Text: DOI
Stange, Katherine E. Algebraic aspects of solving ring-LWE, including ring-based improvements in the Blum-Kalai-Wasserman algorithm. (English) Zbl 1468.94418 SIAM J. Appl. Algebra Geom. 5, No. 2, 366-387 (2021). MSC: 94A60 11T71 11R18 PDFBibTeX XMLCite \textit{K. E. Stange}, SIAM J. Appl. Algebra Geom. 5, No. 2, 366--387 (2021; Zbl 1468.94418) Full Text: DOI arXiv
Sarkar, Palash; Singha, Subhadip Verifying solutions to LWE with implications for concrete security. (English) Zbl 1464.94049 Adv. Math. Commun. 15, No. 2, 257-266 (2021). MSC: 94A60 94A20 68T05 PDFBibTeX XMLCite \textit{P. Sarkar} and \textit{S. Singha}, Adv. Math. Commun. 15, No. 2, 257--266 (2021; Zbl 1464.94049) Full Text: DOI
Luo, Fucai; Al-Kuwari, Saif; Wang, Fuqun; Chen, Kefei Attribute-based proxy re-encryption from standard lattices. (English) Zbl 1497.68161 Theor. Comput. Sci. 865, 52-62 (2021). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{F. Luo} et al., Theor. Comput. Sci. 865, 52--62 (2021; Zbl 1497.68161) Full Text: DOI
Oder, Tobias; Schneider, Tobias; Güneysu, Tim Secure implementation of lattice-based encryption schemes. (English) Zbl 1528.94073 Drechsler, Rolf (ed.) et al., Advanced Boolean techniques. Selected papers from the 13th international workshop on Boolean problems, Bremen, Germany, September 19–21, 2018. Cham: Springer. 21-49 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Oder} et al., in: Advanced Boolean techniques. Selected papers from the 13th international workshop on Boolean problems, Bremen, Germany, September 19--21, 2018. Cham: Springer. 21--49 (2020; Zbl 1528.94073) Full Text: DOI
Boneh, Dan; Eskandarian, Saba; Kim, Sam; Shih, Maurice Improving speed and security in updatable encryption schemes. (English) Zbl 1511.94059 Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12493, 559-589 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 12493, 559--589 (2020; Zbl 1511.94059) Full Text: DOI
Boudgoust, Katharina; Jeudy, Corentin; Roux-Langlois, Adeline; Wen, Weiqiang Towards classical hardness of module-LWE: the linear rank case. (English) Zbl 07666666 Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12492, 289-317 (2020). MSC: 68P25 68Txx 94A60 PDFBibTeX XMLCite \textit{K. Boudgoust} et al., Lect. Notes Comput. Sci. 12492, 289--317 (2020; Zbl 07666666) Full Text: DOI
Yoshida, Yusuke; Kitagawa, Fuyuki; Xagawa, Keita; Tanaka, Keisuke Non-committing encryption with constant ciphertext expansion from standard assumptions. (English) Zbl 1511.94162 Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12492, 36-65 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Yoshida} et al., Lect. Notes Comput. Sci. 12492, 36--65 (2020; Zbl 1511.94162) Full Text: DOI
Brakerski, Zvika; Koppula, Venkata; Vazirani, Umesh; Vidick, Thomas Simpler proofs of quantumness. (English) Zbl 1518.81031 Flammia, Steven T. (ed.), 15th conference on the theory of quantum computation, communication and cryptography, TQC 2020, Riga, Latvia, June 9–12, 2020. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 158, Article 8, 14 p. (2020). MSC: 81P68 81P94 94A20 PDFBibTeX XMLCite \textit{Z. Brakerski} et al., LIPIcs -- Leibniz Int. Proc. Inform. 158, Article 8, 14 p. (2020; Zbl 1518.81031) Full Text: DOI arXiv
Susilo, Willy; Duong, Dung Hoang; Le, Huy Quoc; Pieprzyk, Josef Puncturable encryption: a generic construction from delegatable fully key-homomorphic encryption. (English) Zbl 1522.68187 Chen, Liqun (ed.) et al., Computer security – ESORICS 2020. 25th European symposium on research in computer security, ESORICS 2020, Guildford, UK, September 14–18, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12309, 107-127 (2020). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{W. Susilo} et al., Lect. Notes Comput. Sci. 12309, 107--127 (2020; Zbl 1522.68187) Full Text: DOI arXiv
Freitag, Cody; Komargodski, Ilan; Pass, Rafael Impossibility of strong KDM security with auxiliary input. (English) Zbl 1506.94041 Galdi, Clemente (ed.) et al., Security and cryptography for networks. 12th international conference, SCN 2020, Amalfi, Italy, September 14–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12238, 512-524 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Freitag} et al., Lect. Notes Comput. Sci. 12238, 512--524 (2020; Zbl 1506.94041) Full Text: DOI
Boyen, Xavier; Izabachène, Malika; Li, Qinyi A simple and efficient CCA-secure lattice KEM in the standard model. (English) Zbl 1506.94026 Galdi, Clemente (ed.) et al., Security and cryptography for networks. 12th international conference, SCN 2020, Amalfi, Italy, September 14–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12238, 321-337 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{X. Boyen} et al., Lect. Notes Comput. Sci. 12238, 321--337 (2020; Zbl 1506.94026) Full Text: DOI
Dung Hoang Duong; Susilo, Willy; Minh Kim Bui; Thanh Xuan Khuc A lattice-based certificateless public key encryption with equality test in standard model. (English) Zbl 1500.94024 Liu, Zhe (ed.) et al., Information security and cryptology. 15th international conference, Inscrypt 2019, Nanjing, China, December 6–8, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12020, 50-65 (2020). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Dung Hoang Duong} et al., Lect. Notes Comput. Sci. 12020, 50--65 (2020; Zbl 1500.94024) Full Text: DOI
Genise, Nicholas; Micciancio, Daniele; Peikert, Chris; Walter, Michael Improved discrete Gaussian and Subgaussian analysis for lattice cryptography. (English) Zbl 1501.94042 Kiayias, Aggelos (ed.) et al., Public-key cryptography – PKC 2020. 23rd IACR international conference on practice and theory of public-key cryptography, Edinburgh, UK, May 4–7, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12110, 623-651 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Genise} et al., Lect. Notes Comput. Sci. 12110, 623--651 (2020; Zbl 1501.94042) Full Text: DOI
Jiang, Shaoquan; Gong, Guang; He, Jingnan; Khoa Nguyen; Wang, Huaxiong PAKEs: new framework, new techniques and more efficient lattice-based constructions in the standard model. (English) Zbl 1501.94069 Kiayias, Aggelos (ed.) et al., Public-key cryptography – PKC 2020. 23rd IACR international conference on practice and theory of public-key cryptography, Edinburgh, UK, May 4–7, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12110, 396-427 (2020). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{S. Jiang} et al., Lect. Notes Comput. Sci. 12110, 396--427 (2020; Zbl 1501.94069) Full Text: DOI
Nguyen, Giang Linh Duc; Susilo, Willy; Duong, Dung Hoang; Le, Huy Quoc; Guo, Fuchun Lattice-based IBE with equality test supporting flexible authorization in the standard model. (English) Zbl 1492.94153 Bhargavan, Karthikeyan (ed.) et al., Progress in cryptology – INDOCRYPT 2020. 21st international conference on cryptology in India, Bangalore, India, December 13–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12578, 624-643 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{G. L. D. Nguyen} et al., Lect. Notes Comput. Sci. 12578, 624--643 (2020; Zbl 1492.94153) Full Text: DOI arXiv
Brakerski, Zvika; Döttling, Nico Hardness of LWE on general entropic distributions. (English) Zbl 1492.94068 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12106, 551-575 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{Z. Brakerski} and \textit{N. Döttling}, Lect. Notes Comput. Sci. 12106, 551--575 (2020; Zbl 1492.94068) Full Text: DOI
Brakerski, Zvika; Döttling, Nico Lossiness and entropic hardness for ring-LWE. (English) Zbl 1479.94136 Pass, Rafael (ed.) et al., Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12550, 1-27 (2020). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{Z. Brakerski} and \textit{N. Döttling}, Lect. Notes Comput. Sci. 12550, 1--27 (2020; Zbl 1479.94136) Full Text: DOI
Zhang, Jiang; Yu, Yu; Fan, Shuqin; Zhang, Zhenfeng; Yang, Kang Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes. (English) Zbl 1486.94140 Kiayias, Aggelos (ed.) et al., Public-key cryptography – PKC 2020. 23rd IACR international conference on practice and theory of public-key cryptography, Edinburgh, UK, May 4–7, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12111, 37-65 (2020). Reviewer: Guillermo Morales Luna (Ciudad de México) MSC: 94A60 94A62 14G50 68P25 81P94 68Q17 PDFBibTeX XMLCite \textit{J. Zhang} et al., Lect. Notes Comput. Sci. 12111, 37--65 (2020; Zbl 1486.94140) Full Text: DOI
Blanco-Chacón, Iván Ring learning with errors: a crossroads between post-quantum cryptography, machine learning and number theory. (English) Zbl 1483.94035 Ir. Math. Soc. Bull. 86, 17-46 (2020). MSC: 94A60 11T71 81P94 94-02 68T05 PDFBibTeX XMLCite \textit{I. Blanco-Chacón}, Ir. Math. Soc. Bull. 86, 17--46 (2020; Zbl 1483.94035) Full Text: arXiv Link
Bootland, Carl; Castryck, Wouter; Vercauteren, Frederik On the security of the multivariate ring learning with errors problem. (English) Zbl 1472.94045 Galbraith, Steven D. (ed.), ANTS XIV. Proceedings of the fourteenth algorithmic number theory symposium, Auckland, New Zealand, virtual event, June 29 – July 4, 2020. Berkeley, CA: Mathematical Sciences Publishers (MSP). Open Book Ser. 4, 57-71 (2020). MSC: 94A60 11T71 11R18 PDFBibTeX XMLCite \textit{C. Bootland} et al., Open Book Ser. 4, 57--71 (2020; Zbl 1472.94045) Full Text: DOI
Mahadev, Urmila Classical homomorphic encryption for quantum circuits. (English) Zbl 1457.81026 SIAM J. Comput. 49, No. 6, FOCS18-189-FOCS18-215 (2020). Reviewer: Carlos Pedro Gonçalves (Lisboa) MSC: 81P68 68Q12 81P94 81P45 94A60 PDFBibTeX XMLCite \textit{U. Mahadev}, SIAM J. Comput. 49, No. 6, FOCS18--189-FOCS18--215 (2020; Zbl 1457.81026) Full Text: DOI arXiv
Fuller, Benjamin; Meng, Xianrui; Reyzin, Leonid Computational fuzzy extractors. (English) Zbl 1492.94108 Inf. Comput. 275, Article ID 104602, 21 p. (2020). MSC: 94A60 94B99 PDFBibTeX XMLCite \textit{B. Fuller} et al., Inf. Comput. 275, Article ID 104602, 21 p. (2020; Zbl 1492.94108) Full Text: DOI
Ding, Jintai; Deaton, Joshua; Schmidt, Kurt Giophantus distinguishing attack is a low dimensional learning with errors problem. (English) Zbl 1458.94229 Adv. Math. Commun. 14, No. 4, 573-577 (2020). MSC: 94A60 68P25 81P94 PDFBibTeX XMLCite \textit{J. Ding} et al., Adv. Math. Commun. 14, No. 4, 573--577 (2020; Zbl 1458.94229) Full Text: DOI
Goyal, Rishab; Koppula, Venkata; Waters, Brent Collusion resistant traitor tracing from learning with errors. (English) Zbl 1490.68068 SIAM J. Comput. 49, No. 5, STOC18-94-STOC18-241 (2020). MSC: 68M25 68P25 94A60 PDFBibTeX XMLCite \textit{R. Goyal} et al., SIAM J. Comput. 49, No. 5, STOC18--94-STOC18--241 (2020; Zbl 1490.68068) Full Text: DOI
Ding, Jintai; Deaton, Joshua; Schmidt, Kurt Giophantus distinguishing attack is a low dimensional learning with errors problem. (English) Zbl 1446.94126 Adv. Math. Commun. 14, No. 1, 171-175 (2020). Reviewer: Guillermo Morales Luna (Ciudad de México) MSC: 94A60 68P25 81P94 PDFBibTeX XMLCite \textit{J. Ding} et al., Adv. Math. Commun. 14, No. 1, 171--175 (2020; Zbl 1446.94126) Full Text: DOI
Karimani, S.; Naghdabadi, Z.; Eghlidos, T.; Aref, M. R. An LWE-based verifiable threshold secret sharing scheme. (English) Zbl 1473.94108 Mat. Vopr. Kriptografii 10, No. 2, 97-106 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Karimani} et al., Mat. Vopr. Kriptografii 10, No. 2, 97--106 (2019; Zbl 1473.94108) Full Text: DOI MNR
Liu, Zhen; Han, Yi-Liang; Yang, Xiao-Yuan A signcryption scheme based learning with errors over rings without trapdoor. (English) Zbl 1452.94107 Sun, Xiaoming (ed.) et al., Theoretical computer science. 37th national conference, NCTCS 2019, Lanzhou, China, August 2–4, 2019. Revised selected papers. Singapore: Springer. Commun. Comput. Inf. Sci. 1069, 168-180 (2019). MSC: 94A62 81P94 PDFBibTeX XMLCite \textit{Z. Liu} et al., Commun. Comput. Inf. Sci. 1069, 168--180 (2019; Zbl 1452.94107) Full Text: DOI
Murphy, Sean; Player, Rachel \(\delta\)-subgaussian random variables in cryptography. (English) Zbl 1457.94166 Jang-Jaccard, Julian (ed.) et al., Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11547, 251-268 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Murphy} and \textit{R. Player}, Lect. Notes Comput. Sci. 11547, 251--268 (2019; Zbl 1457.94166) Full Text: DOI
Cojocaru, Alexandru; Colisson, Léo; Kashefi, Elham; Wallden, Petros Qfactory: classically-instructed remote secret qubits preparation. (English) Zbl 1456.94066 Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11921, 615-645 (2019). MSC: 94A60 81P68 PDFBibTeX XMLCite \textit{A. Cojocaru} et al., Lect. Notes Comput. Sci. 11921, 615--645 (2019; Zbl 1456.94066) Full Text: DOI arXiv
Martínez, Ramiro; Morillo, Paz RLWE-based zero-knowledge proofs for linear and multiplicative relations. (English) Zbl 1454.94085 Albrecht, Martin (ed.), Cryptography and coding. 17th IMA international conference, IMACC 2019, Oxford, UK, December 16–18, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11929, 252-277 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Martínez} and \textit{P. Morillo}, Lect. Notes Comput. Sci. 11929, 252--277 (2019; Zbl 1454.94085) Full Text: DOI Link
Das, Dipayan; Au, Man Ho; Zhang, Zhenfei Ring signatures based on Middle-Product Learning with Errors problems. (English) Zbl 1454.94114 Buchmann, Johannes (ed.) et al., Progress in cryptology – AFRICACRYPT 2019. 11th international conference on cryptology in Africa, Rabat, Morocco, July 9–11, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11627, 139-156 (2019). MSC: 94A62 PDFBibTeX XMLCite \textit{D. Das} et al., Lect. Notes Comput. Sci. 11627, 139--156 (2019; Zbl 1454.94114) Full Text: DOI
Apon, Daniel; Dachman-Soled, Dana; Gong, Huijing; Katz, Jonathan Constant-round group key exchange from the ring-LWE assumption. (English) Zbl 1509.94056 Ding, Jintai (ed.) et al., Post-quantum cryptography. 10th international conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11505, 189-205 (2019). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{D. Apon} et al., Lect. Notes Comput. Sci. 11505, 189--205 (2019; Zbl 1509.94056) Full Text: DOI
Boyen, Xavier; Li, Qinyi Direct CCA-secure KEM and deterministic PKE from plain LWE. (English) Zbl 1509.94070 Ding, Jintai (ed.) et al., Post-quantum cryptography. 10th international conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11505, 116-130 (2019). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{X. Boyen} and \textit{Q. Li}, Lect. Notes Comput. Sci. 11505, 116--130 (2019; Zbl 1509.94070) Full Text: DOI Link
Couteau, Geoffroy; Hofheinz, Dennis Designated-verifier pseudorandom generators, and their applications. (English) Zbl 1509.94078 Ishai, Yuval (ed.) et al., Advances in cryptology – EUROCRYPT 2019. 38th annual international conference on the theory and applications of cryptographic techniques, Darmstadt, Germany, May 19–23, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11477, 562-592 (2019). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{G. Couteau} and \textit{D. Hofheinz}, Lect. Notes Comput. Sci. 11477, 562--592 (2019; Zbl 1509.94078) Full Text: DOI
Schneider, Tobias; Paglialonga, Clara; Oder, Tobias; Güneysu, Tim Efficiently masking binomial sampling at arbitrary orders for lattice-based crypto. (English) Zbl 1509.94133 Lin, Dongdai (ed.) et al., Public-key cryptography – PKC 2019. 22nd IACR international conference on practice and theory of public-key cryptography, Beijing, China, April 14–17, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11443, 534-564 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Schneider} et al., Lect. Notes Comput. Sci. 11443, 534--564 (2019; Zbl 1509.94133) Full Text: DOI
Rothblum, Ron D.; Sealfon, Adam; Sotiraki, Katerina Towards non-interactive zero-knowledge for NP from LWE. (English) Zbl 1447.94055 Lin, Dongdai (ed.) et al., Public-key cryptography – PKC 2019. 22nd IACR international conference on practice and theory of public-key cryptography, Beijing, China, April 14–17, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11443, 472-503 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{R. D. Rothblum} et al., Lect. Notes Comput. Sci. 11443, 472--503 (2019; Zbl 1447.94055) Full Text: DOI
Villanueva-Polanco, Ricardo Cold boot attacks on BLISS. (English) Zbl 1453.94139 Schwabe, Peter (ed.) et al., Progress in cryptology – LATINCRYPT 2019. 6th international conference on cryptology and information security in Latin America, Santiago de Chile, Chile, October 2–4, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11774, 40-61 (2019). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{R. Villanueva-Polanco}, Lect. Notes Comput. Sci. 11774, 40--61 (2019; Zbl 1453.94139) Full Text: DOI
Hu, Yupu; Lian, Zhizhu; Chen, Jiangshan; Wang, Baocang; Zhang, Shanshan Algebraic attacks against several weak variants of GVW’13 ABE. (English) Zbl 1439.94034 Int. J. Found. Comput. Sci. 30, No. 4, 607-618 (2019). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Y. Hu} et al., Int. J. Found. Comput. Sci. 30, No. 4, 607--618 (2019; Zbl 1439.94034) Full Text: DOI
Steinfeld, Ron; Sakzad, Amin; Zhao, Raymond K. Practical \(\mathsf{MP} \text{- }\mathsf{LWE}\)-based encryption balancing security-risk versus efficiency. (English) Zbl 1469.94114 Des. Codes Cryptography 87, No. 12, 2847-2884 (2019). MSC: 94A60 68P25 68Q17 PDFBibTeX XMLCite \textit{R. Steinfeld} et al., Des. Codes Cryptography 87, No. 12, 2847--2884 (2019; Zbl 1469.94114) Full Text: DOI
Guo, Qian; Johansson, Thomas; Mårtensson, Erik; Stankovski Wagner, Paul On the asymptotics of solving the LWE problem using coded-BKW with sieving. (English) Zbl 1432.94134 IEEE Trans. Inf. Theory 65, No. 8, 5243-5259 (2019). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{Q. Guo} et al., IEEE Trans. Inf. Theory 65, No. 8, 5243--5259 (2019; Zbl 1432.94134) Full Text: DOI
Bindel, Nina; Buchmann, Johannes; Göpfert, Florian; Schmidt, Markus Estimation of the hardness of the learning with errors problem with a restricted number of samples. (English) Zbl 1458.94214 J. Math. Cryptol. 13, No. 1, 47-67 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Bindel} et al., J. Math. Cryptol. 13, No. 1, 47--67 (2019; Zbl 1458.94214) Full Text: DOI
Okada, Hiroki; Takayasu, Atsushi; Fukushima, Kazuhide; Kiyomoto, Shinsaku; Takagi, Tsuyoshi On the complexity of the LWR-solving BKW algorithm. (English) Zbl 1433.94091 Lee, Kwangsu (ed.), Information security and cryptology – ICISC 2018. 21st international conference, Seoul, South Korea, November 28–30, 2018. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11396, 196-214 (2019). MSC: 94A60 68W40 PDFBibTeX XMLCite \textit{H. Okada} et al., Lect. Notes Comput. Sci. 11396, 196--214 (2019; Zbl 1433.94091) Full Text: DOI
Kim, Duhyeong; Song, Yongsoo Approximate homomorphic encryption over the conjugate-invariant ring. (English) Zbl 1433.94087 Lee, Kwangsu (ed.), Information security and cryptology – ICISC 2018. 21st international conference, Seoul, South Korea, November 28–30, 2018. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11396, 85-102 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Kim} and \textit{Y. Song}, Lect. Notes Comput. Sci. 11396, 85--102 (2019; Zbl 1433.94087) Full Text: DOI
Yin, Wei; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping A new insight – proxy re-encryption under LWE with strong anti-collusion. (English) Zbl 1518.94101 Su, Chunhua (ed.) et al., Information security practice and experience. 14th international conference, ISPEC 2018, Tokyo, Japan, September 25–27, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11125, 559-577 (2018). MSC: 94A60 68T05 PDFBibTeX XMLCite \textit{W. Yin} et al., Lect. Notes Comput. Sci. 11125, 559--577 (2018; Zbl 1518.94101) Full Text: DOI
Huy Quoc Le; Mishra, Pradeep Kumar; Dung Hoang Duong; Yasuda, Masaya Solving LWR via BDD strategy: modulus switching approach. (English) Zbl 1518.94068 Camenisch, Jan (ed.) et al., Cryptology and network security. 17th international conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11124, 357-376 (2018). MSC: 94A60 68T05 PDFBibTeX XMLCite \textit{Huy Quoc Le} et al., Lect. Notes Comput. Sci. 11124, 357--376 (2018; Zbl 1518.94068) Full Text: DOI
Wang, Xingfeng; Zhao, Liang Verifiable single-server private information retrieval. (English) Zbl 1497.68156 Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 478-493 (2018). MSC: 68P20 68P27 94A60 PDFBibTeX XMLCite \textit{X. Wang} and \textit{L. Zhao}, Lect. Notes Comput. Sci. 11149, 478--493 (2018; Zbl 1497.68156) Full Text: DOI
Yun, Kelly; Wang, Xin; Xue, Rui Identity-based functional encryption for quadratic functions from lattices. (English) Zbl 1458.94288 Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 409-425 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Yun} et al., Lect. Notes Comput. Sci. 11149, 409--425 (2018; Zbl 1458.94288) Full Text: DOI
Li, Jie; Zhang, Daode; Lu, Xianhui; Wang, Kunpeng Compact (targeted homomorphic) inner product encryption from LWE. (English) Zbl 1452.94075 Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 132-140 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Li} et al., Lect. Notes Comput. Sci. 10631, 132--140 (2018; Zbl 1452.94075) Full Text: DOI
Zhou, Shuai; Xue, Haiyang; Zhang, Daode; Wang, Kunpeng; Lu, Xianhui; Li, Bao; He, Jingnan Preprocess-then-NTT Technique and its applications to Kyber and NewHope. (English) Zbl 1477.94065 Guo, Fuchun (ed.) et al., Information security and cryptology. 14th international conference, Inscrypt 2018, Fuzhou, China, December 14–17, 2018, Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11449, 117-137 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Zhou} et al., Lect. Notes Comput. Sci. 11449, 117--137 (2018; Zbl 1477.94065) Full Text: DOI