Skip to main content

PRivacy preserving pOst-quantuM systEms from advanced crypTograpHic mEchanisms Using latticeS

Deliverables

Survey on computational problems, cryptanalysis and basic tools

D3.1 Survey on computational problems, cryptanalysis and basic tools (R,PU,M10, RUB) This deliverable will give details on the related-work on computational problems, cryptanalysis and lattice trapdoors, as well as a complete list of open problems that the WP will study.

Intermediate results on computational problems, cryptanalysis and basic tools

D3.2 Intermediate results on computational problems, cryptanalysis and basic tools (R,PU,M24, UR1) This deliverable will describe the progress that partners will have achieved in the half-life of the project, regarding computational problems, cryptanalysis and lattice trapdoors. The deliverable will also contain the related problems that remain open and that will be the object of research in the 24 remaining months.

Survey of existing building blocks for practical advanced protocols

D4.1 Survey of existing building blocks for practical advanced protocols (R,PU,M10, ENSL) This deliverable will give details on the related-work on cryptographic building blocks for advanced protocols, as well as a complete list of open problems that the WP will study. In particular, detailed comparisons will be given among existing lattice-based signatures in the standard model and homomorphic commitment schemes.

Dissemination Plan

D2.2 Dissemination Plan (R,PU,M03, ENSL) Will present dissemination activities that are planned

Intermediate results on privacy-preserving cryptographic protocols

D5.2 Intermediate results on privacy-preserving cryptographic protocols (R,PU,M24, TNO) This deliverable will describe the progress that partners will have achieved in the half-life of the project, regarding privacy-preserving lattice-based protocols. The deliverable will also contain the related problems that remain open and that will be the object of research in the 24 remaining months.

Project Quality plan

The project quality plan (the project handbook)

Survey of existing privacy-preserving cryptographic protocols

D5.1 Survey of existing privacy-preserving cryptographic protocols (R,PU,M10, ORA) This deliverable will give details on the related-work on privacy-preserving cryptographic protocols, as well as a complete list of open problems that the WP will study.

Intermediate results on building blocks for practical advanced protocols

D4.2 Intermediate results on building blocks for practical advanced protocols (R,PU,M24, WIS) This deliverable will describe the progress that partners will have achieved in the half-life of the project, regarding cryptographic building blocks. The deliverable will also contain the related problems that remain open and that will be the object of research in the 24 remaining months.

Project website

D2.1 Project website (DEC,PU, M03, ENSL) Project’s website (including project information, news, publications, etc.)

Publications

ModFalcon: Compact Signatures Based On Module-NTRU Lattices

Author(s): Chitchanok Chuengsatiansup, Thomas Prest, Damien Stehlé, Alexandre Wallet, Keita Xagawa
Published in: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, 2020, Page(s) 853-866
DOI: 10.1145/3320269.3384758

On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption

Author(s): Benjamin R. Curtis, Rachel Player
Published in: Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography - WAHC'19, 2019, Page(s) 1-10
DOI: 10.1145/3338469.3358940

Shorter Lattice-based Zero-Knowledge Proofs for the Correctness of a Shuffle

Author(s): Javier Herranz, Ramiro Martínez and Manuel Sánchez
Published in: VOTING'2021 (Financial Cryptography Workshops), 2021

GALACTICS - Gaussian Sampling for Lattice-Based Constant- Time Implementation of Cryptographic Signatures, Revisited

Author(s): Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Mélissa Rossi, Mehdi Tibouchi
Published in: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, Page(s) 2147-2164
DOI: 10.1145/3319535.3363223

Implementing RLWE-based Schemes Using an RSA Co-Processor

Author(s): Martin R. Albrecht Christian Hanser Andrea Hoeller Thomas Pöppelmann Fernando Virdia Andreas Wallner
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019
DOI: 10.13154/tches.v2019.i1.169-208

Cold Boot Attacks on Ring and Module LWE Keys Under the NTT

Author(s): Martin R. Albrecht Amit Deo Kenneth G. Paterson
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018
DOI: 10.13154/tches.v2018.i3.173-213

Multi-Client Functional Encryption for Linear Functions in the Standard Model from LWE

Author(s): Benoît Libert and Radu Titiu
Published in: ASIACRYPT 2019, 2019

Divisible E-Cash from Constrained Pseudo-Random Functions

Author(s): Florian Bourse, David Pointcheval and Olivier Sanders
Published in: ASIACRYPT 2019, 2019

On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption

Author(s): Benjamin R Curtis and Rachel Prayer
Published in: 7th Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC'19), 2019

Finding a Nash equilibrium is no easier than breaking Fiat-Shamir

Author(s): Arka Rai Choudhuri, Pavel Hubáček, Chethan Kamath, Krzysztof Pietrzak, Alon Rosen, Guy N. Rothblum
Published in: Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, 2019, Page(s) 1103-1114
DOI: 10.1145/3313276.3316400

Isochronous Gaussian Sampling: From Inception to Implementation - With Applications to the Falcon Signature Scheme

Author(s): James Howe, Thomas Prest, Thomas Ricosset, Mélissa Rossi
Published in: Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Paris, France, April 15–17, 2020, Proceedings, Issue 12100, 2020, Page(s) 53-71
DOI: 10.1007/978-3-030-44223-1_4

Cryptography from One-Way Communication: On Completeness of Finite Channels

Author(s): Shweta Agrawal, Yuval Ishai, Eyal Kushilevitz, Varun Narayanan, Manoj Prabhakaran, Vinod Prabhakaran, Alon Rosen
Published in: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part III, Issue 12493, 2020, Page(s) 653-685
DOI: 10.1007/978-3-030-64840-4_22

Non-interactive Composition of Sigma-Protocols via Share-then-Hash

Author(s): Masayuki Abe, Miguel Ambrona, Andrej Bogdanov, Miyako Ohkubo, Alon Rosen
Published in: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part III, Issue 12493, 2020, Page(s) 749-773
DOI: 10.1007/978-3-030-64840-4_25

Lattice Reduction with Approximate Enumeration Oracles - Practical Algorithms and Concrete Performance

Author(s): Martin R. Albrecht, Shi Bai, Jianwei Li, Joe Rowell
Published in: Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part II, Issue 12826, 2021, Page(s) 732-759
DOI: 10.1007/978-3-030-84245-1_25

Random Self-reducibility of Ideal-SVP via Arakelov Random Walks

Author(s): Koen de Boer, Léo Ducas, Alice Pellet-Mary, Benjamin Wesolowski
Published in: Advances in Cryptology – CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part II, Issue 12171, 2020, Page(s) 243-273
DOI: 10.1007/978-3-030-56880-1_9

(One) Failure Is Not an Option: Bootstrapping the Search for Failures in Lattice-Based Encryption Schemes

Author(s): Jan-Pieter D’Anvers, Mélissa Rossi, Fernando Virdia
Published in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part III, Issue 12107, 2020, Page(s) 3-33
DOI: 10.1007/978-3-030-45727-3_1

Public-Coin Zero-Knowledge Arguments with (almost) Minimal Time and Space Overheads

Author(s): Alexander R. Block, Justin Holmgren, Alon Rosen, Ron D. Rothblum, Pratik Soni
Published in: Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part II, Issue 12551, 2020, Page(s) 168-197
DOI: 10.1007/978-3-030-64378-2_7

Constant-Size Lattice-Based Group Signature with Forward Security in the Standard Model

Author(s): Sébastien Canard, Adela Georgescu, Guillaume Kaim, Adeline Roux-Langlois, Jacques Traoré
Published in: Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29 – December 1, 2020, Proceedings, Issue 12505, 2020, Page(s) 24-44
DOI: 10.1007/978-3-030-62576-4_2

Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security

Author(s): Veronika Kuchta, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Shi-Feng Sun
Published in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part III, Issue 12107, 2020, Page(s) 703-728
DOI: 10.1007/978-3-030-45727-3_24

Evaluating the Effectiveness of Heuristic Worst-Case Noise Analysis in FHE

Author(s): Anamaria Costache, Kim Laine, Rachel Player
Published in: Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part II, Issue 12309, 2020, Page(s) 546-565
DOI: 10.1007/978-3-030-59013-0_27

Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices

Author(s): Olivier Bernard, Adeline Roux-Langlois
Published in: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II, Issue 12492, 2020, Page(s) 349-380
DOI: 10.1007/978-3-030-64834-3_12

Practical Product Proofs for Lattice Commitments

Author(s): Thomas Attema, Vadim Lyubashevsky, Gregor Seiler
Published in: Advances in Cryptology – CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part II, Issue 12171, 2020, Page(s) 470-499
DOI: 10.1007/978-3-030-56880-1_17

Middle-Product Learning with Rounding Problem and Its Applications

Author(s): Shi Bai, Katharina Boudgoust, Dipayan Das, Adeline Roux-Langlois, Weiqiang Wen, Zhenfei Zhang
Published in: Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part I, Issue 11921, 2019, Page(s) 55-81
DOI: 10.1007/978-3-030-34578-5_3

FHE-Based Bootstrapping of Designated-Prover NIZK

Author(s): Zvika Brakerski, Sanjam Garg, Rotem Tsabary
Published in: Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part I, Issue 12550, 2020, Page(s) 657-683
DOI: 10.1007/978-3-030-64375-1_23

MPSign: A Signature from Small-Secret Middle-Product Learning with Errors

Author(s): Shi Bai, Dipayan Das, Ryo Hiromasa, Miruna Rosca, Amin Sakzad, Damien Stehlé, Ron Steinfeld, Zhenfei Zhang
Published in: Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part II, Issue 12111, 2020, Page(s) 66-93
DOI: 10.1007/978-3-030-45388-6_3

Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security

Author(s): Benoît Libert, Khoa Nguyen, Alain Passelègue, Radu Titiu
Published in: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part I, Issue 12491, 2020, Page(s) 128-158
DOI: 10.1007/978-3-030-64837-4_5

Lattice-Based E-Cash, Revisited

Author(s): Amit Deo, Benoît Libert, Khoa Nguyen, Olivier Sanders
Published in: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II, Issue 12492, 2020, Page(s) 318-348
DOI: 10.1007/978-3-030-64834-3_11

Hardness of LWE on General Entropic Distributions

Author(s): Zvika Brakerski, Nico Döttling
Published in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part II, Issue 12106, 2020, Page(s) 551-575
DOI: 10.1007/978-3-030-45724-2_19

Secure Computation from One-Way Noisy Communication, or: Anti-correlation via Anti-concentration

Author(s): Shweta Agrawal, Yuval Ishai, Eyal Kushilevitz, Varun Narayanan, Manoj Prabhakaran, Vinod Prabhakaran, Alon Rosen
Published in: Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part II, Issue 12826, 2021, Page(s) 124-154
DOI: 10.1007/978-3-030-84245-1_5

Transciphering, Using FiLIP and TFHE for an Efficient Delegation of Computation

Author(s): Clément Hoffmann, Pierrick Méaux, Thomas Ricosset
Published in: Progress in Cryptology – INDOCRYPT 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13–16, 2020, Proceedings, Issue 12578, 2020, Page(s) 39-61
DOI: 10.1007/978-3-030-65277-7_3

The Measure-and-Reprogram Technique 2.0: Multi-round Fiat-Shamir and More

Author(s): Jelle Don, Serge Fehr, Christian Majenz
Published in: Advances in Cryptology – CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part III, Issue 12172, 2020, Page(s) 602-631
DOI: 10.1007/978-3-030-56877-1_21

Fast Reduction of Algebraic Lattices over Cyclotomic Fields

Author(s): Paul Kirchner, Thomas Espitau, Pierre-Alain Fouque
Published in: Advances in Cryptology – CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part II, Issue 12171, 2020, Page(s) 155-185
DOI: 10.1007/978-3-030-56880-1_6

Faster Enumeration-Based Lattice Reduction: Root Hermite Factor $$k^{1/(2k)}$$ Time $$k^{k/8+o(k)}$$

Author(s): Martin R. Albrecht, Shi Bai, Pierre-Alain Fouque, Paul Kirchner, Damien Stehlé, Weiqiang Wen
Published in: Advances in Cryptology – CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part II, Issue 12171, 2020, Page(s) 186-212
DOI: 10.1007/978-3-030-56880-1_7

Non-interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings

Author(s): Julien Devevey, Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung
Published in: Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I, Issue 12710, 2021, Page(s) 659-690
DOI: 10.1007/978-3-030-75245-3_24

Exploring Trade-offs in Batch Bounded Distance Decoding

Author(s): Martin R. Albrecht, Benjamin R. Curtis, Thomas Wunderer
Published in: Selected Areas in Cryptography – SAC 2019 - 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers, Issue 11959, 2020, Page(s) 467-491
DOI: 10.1007/978-3-030-38471-5_19

Round-Optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices

Author(s): Martin R. Albrecht, Alex Davidson, Amit Deo, Nigel P. Smart
Published in: Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part II, Issue 12711, 2021, Page(s) 261-289
DOI: 10.1007/978-3-030-75248-4_10

Estimating Quantum Speedups for Lattice Sieves

Author(s): Martin R. Albrecht, Vlad Gheorghiu, Eamonn W. Postlethwaite, John M. Schanck
Published in: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II, Issue 12492, 2020, Page(s) 583-613
DOI: 10.1007/978-3-030-64834-3_20

Blind Functional Encryption

Author(s): Sébastien Canard, Adel Hamdi, Fabien Laguillaumie
Published in: Information and Communications Security - 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24–26, 2020, Proceedings, Issue 12282, 2020, Page(s) 183-201
DOI: 10.1007/978-3-030-61078-4_11

An Efficient and Provable Masked Implementation of qTESLA

Author(s): François Gérard, Mélissa Rossi
Published in: Smart Card Research and Advanced Applications - 18th International Conference, CARDIS 2019, Prague, Czech Republic, November 11–13, 2019, Revised Selected Papers, Issue 11833, 2020, Page(s) 74-91
DOI: 10.1007/978-3-030-42068-0_5

Improved Secure Integer Comparison via Homomorphic Encryption

Author(s): Florian Bourse, Olivier Sanders, Jacques Traoré
Published in: Topics in Cryptology – CT-RSA 2020 - The Cryptographers’ Track at the RSA Conference 2020, San Francisco, CA, USA, February 24–28, 2020, Proceedings, Issue 12006, 2020, Page(s) 391-416
DOI: 10.1007/978-3-030-40186-3_17

On the Ring-LWE and Polynomial-LWE Problems

Author(s): Miruna Rosca, Damien Stehlé, Alexandre Wallet
Published in: Advances in Cryptology – EUROCRYPT 2018, Issue 10820, 2018, Page(s) 146-173
DOI: 10.1007/978-3-319-78381-9_6

Estimate All the {LWE, NTRU} Schemes!

Author(s): Martin R. Albrecht, Benjamin R. Curtis, Amit Deo, Alex Davidson, Rachel Player, Eamonn W. Postlethwaite, Fernando Virdia, Thomas Wunderer
Published in: Security and Cryptography for Networks - 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedings, Issue 11035, 2018, Page(s) 351-367
DOI: 10.1007/978-3-319-98113-0_19

The General Sieve Kernel and New Records in Lattice Reduction

Author(s): Martin R. Albrecht, Léo Ducas, Gottfried Herold, Elena Kirshanova, Eamonn W. Postlethwaite, Marc Stevens
Published in: Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part II, Issue 11477, 2019, Page(s) 717-746
DOI: 10.1007/978-3-030-17656-3_25

Approx-SVP in Ideal Lattices with Pre-processing

Author(s): Alice Pellet-Mary, Guillaume Hanrot, Damien Stehlé
Published in: Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part II, Issue 11477, 2019, Page(s) 685-716
DOI: 10.1007/978-3-030-17656-3_24

Measuring, Simulating and Exploiting the Head Concavity Phenomenon in BKZ

Author(s): Shi Bai, Damien Stehlé, Weiqiang Wen
Published in: Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part I, Issue 11272, 2018, Page(s) 369-404
DOI: 10.1007/978-3-030-03326-2_13

$$\delta $$ -subgaussian Random Variables in Cryptography

Author(s): Sean Murphy, Rachel Player
Published in: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedings, Issue 11547, 2019, Page(s) 251-268
DOI: 10.1007/978-3-030-21548-4_14

Two-Message Statistically Sender-Private OT from LWE

Author(s): Zvika Brakerski, Nico Döttling
Published in: Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II, Issue 11240, 2018, Page(s) 370-390
DOI: 10.1007/978-3-030-03810-6_14

On the Shortness of Vectors to Be Found by the Ideal-SVP Quantum Algorithm

Author(s): Léo Ducas, Maxime Plançon, Benjamin Wesolowski
Published in: Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part I, Issue 11692, 2019, Page(s) 322-351
DOI: 10.1007/978-3-030-26948-7_12

Learning Strikes Again: The Case of the DRS Signature Scheme

Author(s): Yang Yu, Léo Ducas
Published in: Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part II, Issue 11273, 2018, Page(s) 525-543
DOI: 10.1007/978-3-030-03329-3_18

Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model

Author(s): Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner
Published in: Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part II, Issue 11693, 2019, Page(s) 356-383
DOI: 10.1007/978-3-030-26951-7_13

LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS

Author(s): Jonathan Bootle, Claire Delaplace, Thomas Espitau, Pierre-Alain Fouque, Mehdi Tibouchi
Published in: Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part I, Issue 11272, 2018, Page(s) 494-524
DOI: 10.1007/978-3-030-03326-2_17

Lattice-Based Zero-Knowledge Arguments for Integer Relations

Author(s): Benoît Libert, San Ling, Khoa Nguyen, Huaxiong Wang
Published in: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II, Issue 10992, 2018, Page(s) 700-732
DOI: 10.1007/978-3-319-96881-0_24

Adaptively Secure Distributed PRFs from $$\mathsf {LWE}$$

Author(s): Benoît Libert, Damien Stehlé, Radu Titiu
Published in: Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II, Issue 11240, 2018, Page(s) 391-421
DOI: 10.1007/978-3-030-03810-6_15

Masking the GLP Lattice-Based Signature Scheme at Any Order

Author(s): Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi
Published in: Advances in Cryptology – EUROCRYPT 2018, Issue 10821, 2018, Page(s) 354-384
DOI: 10.1007/978-3-319-78375-8_12

Zero-Knowledge Elementary Databases with More Expressive Queries

Author(s): Benoît Libert, Khoa Nguyen, Benjamin Hong Meng Tan, Huaxiong Wang
Published in: Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, Issue 11442, 2019, Page(s) 255-285
DOI: 10.1007/978-3-030-17253-4_9

Assessment of the Key-Reuse Resilience of NewHope

Author(s): Aurélie Bauer, Henri Gilbert, Guénaël Renault, Mélissa Rossi
Published in: Topics in Cryptology – CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4–8, 2019, Proceedings, Issue 11405, 2019, Page(s) 272-292
DOI: 10.1007/978-3-030-12612-4_14

Fully Secure Attribute-Based Encryption for t-CNF from LWE

Author(s): Rotem Tsabary
Published in: Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part I, Issue 11692, 2019, Page(s) 62-85
DOI: 10.1007/978-3-030-26948-7_3

A Refined Analysis of the Cost for Solving LWE via uSVP

Author(s): Shi Bai, Shaun Miller, Weiqiang Wen
Published in: Progress in Cryptology – AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedings, Issue 11627, 2019, Page(s) 181-205
DOI: 10.1007/978-3-030-23696-0_10

Towards Practical Microcontroller Implementation of the Signature Scheme Falcon

Author(s): Tobias Oder, Julian Speith, Kira Höltgen, Tim Güneysu
Published in: Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papers, Issue 11505, 2019, Page(s) 65-80
DOI: 10.1007/978-3-030-25510-7_4

Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto

Author(s): Tobias Schneider, Clara Paglialonga, Tobias Oder, Tim Güneysu
Published in: Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, Issue 11443, 2019, Page(s) 534-564
DOI: 10.1007/978-3-030-17259-6_18

Attacks on the AJPS Mersenne-Based Cryptosystem

Author(s): Koen de Boer, Léo Ducas, Stacey Jeffery, Ronald de Wolf
Published in: Post-Quantum Cryptography, Issue 10786, 2018, Page(s) 101-120
DOI: 10.1007/978-3-319-79063-3_5

A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle Model

Author(s): Eike Kiltz, Vadim Lyubashevsky, Christian Schaffner
Published in: Advances in Cryptology – EUROCRYPT 2018, Issue 10822, 2018, Page(s) 552-586
DOI: 10.1007/978-3-319-78372-7_18

Proof of a Shuffle for Lattice-Based Cryptography

Author(s): Nuria Costa, Ramiro Martínez, Paz Morillo
Published in: Secure IT Systems, Issue 10674, 2017, Page(s) 280-296
DOI: 10.1007/978-3-319-70290-2_17

Shortest Vector from Lattice Sieving: A Few Dimensions for Free

Author(s): Léo Ducas
Published in: Advances in Cryptology – EUROCRYPT 2018, Issue 10820, 2018, Page(s) 125-145
DOI: 10.1007/978-3-319-78381-9_5

A Comparison of the Homomorphic Encryption Libraries HElib, SEAL and FV-NFLlib

Author(s): Carlos Aguilar Melchor, Marc-Olivier Kilijian, Cédric Lefebvre, Thomas Ricosset
Published in: Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8–9, 2018, Revised Selected Papers, Issue 11359, 2019, Page(s) 425-442
DOI: 10.1007/978-3-030-12942-2_32

More Efficient Algorithms for the NTRU Key Generation Using the Field Norm

Author(s): Thomas Pornin, Thomas Prest
Published in: Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, Issue 11443, 2019, Page(s) 504-533
DOI: 10.1007/978-3-030-17259-6_17

RLWE-Based Zero-Knowledge Proofs for Linear and Multiplicative Relations

Author(s): Ramiro Martínez, Paz Morillo
Published in: Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16–18, 2019, Proceedings, Issue 11929, 2019, Page(s) 252-277
DOI: 10.1007/978-3-030-35199-1_13

Divisible E-Cash from Constrained Pseudo-Random Functions

Author(s): Florian Bourse, David Pointcheval, Olivier Sanders
Published in: Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part I, Issue 11921, 2019, Page(s) 679-708
DOI: 10.1007/978-3-030-34578-5_24

Multi-Client Functional Encryption for Linear Functions in the Standard Model from LWE

Author(s): Benoît Libert, Radu Ţiţiu
Published in: Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part III, Issue 11923, 2019, Page(s) 520-551
DOI: 10.1007/978-3-030-34618-8_18

Order-LWE and the Hardness of Ring-LWE with Entropic Secrets

Author(s): Madalina Bolboceanu, Zvika Brakerski, Renen Perlman, Devika Sharma
Published in: Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II, Issue 11922, 2019, Page(s) 91-120
DOI: 10.1007/978-3-030-34621-8_4

Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control

Author(s): Zvika Brakerski, Yael Kalai
Published in: Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part II, Issue 12111, 2020, Page(s) 97-123
DOI: 10.1007/978-3-030-45388-6_4

On Bounded Distance Decoding with Predicate: Breaking the “Lattice Barrier” for the Hidden Number Problem

Author(s): Martin R. Albrecht, Nadia Heninger
Published in: Advances in Cryptology – EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part I, Issue 12696, 2021, Page(s) 528-558
DOI: 10.1007/978-3-030-77870-5_19

Integral Matrix Gram Root and Lattice Gaussian Sampling Without Floats

Author(s): Léo Ducas, Steven Galbraith, Thomas Prest, Yang Yu
Published in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part II, Issue 12106, 2020, Page(s) 608-637
DOI: 10.1007/978-3-030-45724-2_21

An LLL Algorithm for Module Lattices

Author(s): Changmin Lee, Alice Pellet-Mary, Damien Stehlé, Alexandre Wallet
Published in: Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II, Issue 11922, 2019, Page(s) 59-90
DOI: 10.1007/978-3-030-34621-8_3

Advanced Lattice Sieving on GPUs, with Tensor Cores

Author(s): Léo Ducas, Marc Stevens, Wessel van Woerden
Published in: Advances in Cryptology – EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part II, Issue 12697, 2021, Page(s) 249-279
DOI: 10.1007/978-3-030-77886-6_9

Subtractive Sets over Cyclotomic Rings - Limits of Schnorr-Like Arguments over Lattices

Author(s): Martin R. Albrecht, Russell W. F. Lai
Published in: Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part II, Issue 12826, 2021, Page(s) 519-548
DOI: 10.1007/978-3-030-84245-1_18

Scalable Pseudorandom Quantum States

Author(s): Zvika Brakerski, Omri Shmueli
Published in: Advances in Cryptology – CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part II, Issue 12171, 2020, Page(s) 417-440
DOI: 10.1007/978-3-030-56880-1_15

Bifurcated Signatures: Folding the Accountability vs. Anonymity Dilemma into a Single Private Signing Scheme

Author(s): Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung
Published in: Advances in Cryptology – EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part III, Issue 12698, 2021, Page(s) 521-552
DOI: 10.1007/978-3-030-77883-5_18

Generic Authenticated Key Exchange in the Quantum Random Oracle Model

Author(s): Kathrin Hövelmanns, Eike Kiltz, Sven Schäge, Dominique Unruh
Published in: Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part II, Issue 12111, 2020, Page(s) 389-422
DOI: 10.1007/978-3-030-45388-6_14

On the Integer Polynomial Learning with Errors Problem

Author(s): Julien Devevey, Amin Sakzad, Damien Stehlé, Ron Steinfeld
Published in: Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I, Issue 12710, 2021, Page(s) 184-214
DOI: 10.1007/978-3-030-75245-3_8

Lattice-Based Blind Signatures, Revisited

Author(s): Eduard Hauck, Eike Kiltz, Julian Loss, Ngoc Khanh Nguyen
Published in: Advances in Cryptology – CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part II, Issue 12171, 2020, Page(s) 500-529
DOI: 10.1007/978-3-030-56880-1_18

Limits on the Efficiency of (Ring) LWE Based Non-interactive Key Exchange

Author(s): Siyao Guo, Pritish Kamath, Alon Rosen, Katerina Sotiraki
Published in: Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part I, Issue 12110, 2020, Page(s) 374-395
DOI: 10.1007/978-3-030-45374-9_13

LWE with Side Information: Attacks and Concrete Security Estimation

Author(s): Dana Dachman-Soled, Léo Ducas, Huijing Gong, Mélissa Rossi
Published in: Advances in Cryptology – CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part II, Issue 12171, 2020, Page(s) 329-358
DOI: 10.1007/978-3-030-56880-1_12

Time- and Space-Efficient Arguments from Groups of Unknown Order

Author(s): Alexander R. Block, Justin Holmgren, Alon Rosen, Ron D. Rothblum, Pratik Soni
Published in: Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part IV, Issue 12828, 2021, Page(s) 123-152
DOI: 10.1007/978-3-030-84259-8_5

Adaptive Simulation Security for Inner Product Functional Encryption

Author(s): Shweta Agrawal, Benoît Libert, Monosij Maitra, Radu Titiu
Published in: Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part I, Issue 12110, 2020, Page(s) 34-64
DOI: 10.1007/978-3-030-45374-9_2

Analysing the HPKE Standard

Author(s): Joël Alwen, Bruno Blanchet, Eduard Hauck, Eike Kiltz, Benjamin Lipp, Doreen Riepel
Published in: Advances in Cryptology – EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part I, Issue 12696, 2021, Page(s) 87-116
DOI: 10.1007/978-3-030-77870-5_4

Key Recovery from Gram–Schmidt Norm Leakage in Hash-and-Sign Signatures over NTRU Lattices

Author(s): Pierre-Alain Fouque, Paul Kirchner, Mehdi Tibouchi, Alexandre Wallet, Yang Yu
Published in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part III, Issue 12107, 2020, Page(s) 34-63
DOI: 10.1007/978-3-030-45727-3_2

Loop-Abort Faults on Lattice-Based Signatures and Key Exchange Protocols

Author(s): Thomas Espitau, Pierre-Alain Fouque, Benoit Gerard, Mehdi Tibouchi
Published in: IEEE Transactions on Computers, 2018, Page(s) 1-1, ISSN 0018-9340
DOI: 10.1109/tc.2018.2833119

CDT-based Gaussian Sampling: From Multi to Double Precision

Author(s): Thomas Ricosset, Carlos Aguilar-Melchor
Published in: IEEE Transactions on Computers, 2018, Page(s) 1-1, ISSN 0018-9340
DOI: 10.1109/tc.2018.2807839

On the smoothing parameter and last minimum of random orthogonal lattices

Author(s): Elena Kirshanova, Huyen Nguyen, Damien Stehlé, Alexandre Wallet
Published in: Designs, Codes and Cryptography, Issue 88/5, 2020, Page(s) 931-950, ISSN 0925-1022
DOI: 10.1007/s10623-020-00719-w

Mildly Short Vectors in Cyclotomic Ideal Lattices in Quantum Polynomial Time

Author(s): Ronald Cramer, Léo Ducas, Benjamin Wesolowski
Published in: Journal of the ACM, Issue 68/2, 2021, Page(s) 1-26, ISSN 0004-5411
DOI: 10.1145/3431725