Ünal, Akın Impossibility results for lattice-based functional encryption schemes. (English) Zbl 1479.94261 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12105, 169-199 (2020). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Ünal}, Lect. Notes Comput. Sci. 12105, 169--199 (2020; Zbl 1479.94261) Full Text: DOI OpenURL
Gavin, Gerald; Bonnevay, Stephane Fractional LWE: a nonlinear variant of LWE. (English) Zbl 1457.94136 Mu, Yi (ed.) et al., Cryptology and network security. 18th international conference, CANS 2019, Fuzhou, China, October 25–27, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11829, 360-371 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{G. Gavin} and \textit{S. Bonnevay}, Lect. Notes Comput. Sci. 11829, 360--371 (2019; Zbl 1457.94136) Full Text: DOI OpenURL
Bai, Shi; Miller, Shaun; Wen, Weiqiang A refined analysis of the cost for solving LWE via uSVP. (English) Zbl 1454.94045 Buchmann, Johannes (ed.) et al., Progress in cryptology – AFRICACRYPT 2019. 11th international conference on cryptology in Africa, Rabat, Morocco, July 9–11, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11627, 181-205 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{S. Bai} et al., Lect. Notes Comput. Sci. 11627, 181--205 (2019; Zbl 1454.94045) Full Text: DOI HAL OpenURL
Singh, Kunwar; Rangan, C. Pandu; Banerjee, A. K. Lattice-based identity-based resplittable threshold public key encryption scheme. (English) Zbl 1376.94045 Int. J. Comput. Math. 93, No. 2, 289-307 (2016). MSC: 94A60 94A62 68W20 PDF BibTeX XML Cite \textit{K. Singh} et al., Int. J. Comput. Math. 93, No. 2, 289--307 (2016; Zbl 1376.94045) Full Text: DOI OpenURL
Wang, Fuqun; Wang, Kunpeng; Li, Bao LWE-based FHE with better parameters. (English) Zbl 1398.68149 Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 175-192 (2015). MSC: 68P25 PDF BibTeX XML Cite \textit{F. Wang} et al., Lect. Notes Comput. Sci. 9241, 175--192 (2015; Zbl 1398.68149) Full Text: DOI OpenURL
Georgescu, Adela An LWE-based key transfer protocol with anonymity. (English) Zbl 1308.94073 Tatra Mt. Math. Publ. 53, 119-135 (2012). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{A. Georgescu}, Tatra Mt. Math. Publ. 53, 119--135 (2012; Zbl 1308.94073) Full Text: DOI Link OpenURL
Micciancio, Daniele; Mol, Petros Pseudorandom knapsacks and the sample complexity of LWE search-to-decision reductions. (English) Zbl 1287.94085 Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 465-484 (2011). MSC: 94A60 62B10 PDF BibTeX XML Cite \textit{D. Micciancio} and \textit{P. Mol}, Lect. Notes Comput. Sci. 6841, 465--484 (2011; Zbl 1287.94085) Full Text: DOI OpenURL
Lyubashevsky, Vadim; Palacio, Adriana; Segev, Gil Public-key cryptographic primitives provably as secure as subset sum. (English) Zbl 1274.94096 Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 382-400 (2010). MSC: 94A60 PDF BibTeX XML Cite \textit{V. Lyubashevsky} et al., Lect. Notes Comput. Sci. 5978, 382--400 (2010; Zbl 1274.94096) Full Text: DOI OpenURL
Bendlin, Rikke; Damgård, Ivan Threshold decryption and zero-knowledge proofs for lattice-based cryptosystems. (English) Zbl 1274.94040 Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 201-218 (2010). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{R. Bendlin} and \textit{I. Damgård}, Lect. Notes Comput. Sci. 5978, 201--218 (2010; Zbl 1274.94040) Full Text: DOI OpenURL
Peikert, Chris Public-key cryptosystems from the worst-case shortest vector problem (extended abstract). (English) Zbl 1304.94079 Proceedings of the 41st annual ACM symposium on theory of computing, STOC ’09. Bethesda, MD, USA, May 31 – June 2, 2009. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-613-7). 333-342 (2009). MSC: 94A60 68W25 PDF BibTeX XML Cite \textit{C. Peikert}, in: Proceedings of the 41st annual ACM symposium on theory of computing, STOC '09. Bethesda, MD, USA, May 31 -- June 2, 2009. New York, NY: Association for Computing Machinery (ACM). 333--342 (2009; Zbl 1304.94079) Full Text: DOI OpenURL
Naor, Moni; Segev, Gil Public-key cryptosystems resilient to key leakage. (English) Zbl 1252.94091 Halevi, Shai (ed.), Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 18-35 (2009). MSC: 94A60 PDF BibTeX XML Cite \textit{M. Naor} and \textit{G. Segev}, Lect. Notes Comput. Sci. 5677, 18--35 (2009; Zbl 1252.94091) Full Text: DOI OpenURL