Skip to main content

PRivacy preserving pOst-quantuM systEms from advanced crypTograpHic mEchanisms Using latticeS

Deliverables

Survey on computational problems, cryptanalysis and basic tools

D3.1 Survey on computational problems, cryptanalysis and basic tools (R,PU,M10, RUB) This deliverable will give details on the related-work on computational problems, cryptanalysis and lattice trapdoors, as well as a complete list of open problems that the WP will study.

Survey of existing building blocks for practical advanced protocols

D4.1 Survey of existing building blocks for practical advanced protocols (R,PU,M10, ENSL) This deliverable will give details on the related-work on cryptographic building blocks for advanced protocols, as well as a complete list of open problems that the WP will study. In particular, detailed comparisons will be given among existing lattice-based signatures in the standard model and homomorphic commitment schemes.

Dissemination Plan

D2.2 Dissemination Plan (R,PU,M03, ENSL) Will present dissemination activities that are planned

Project Quality plan

The project quality plan (the project handbook)

Survey of existing privacy-preserving cryptographic protocols

D5.1 Survey of existing privacy-preserving cryptographic protocols (R,PU,M10, ORA) This deliverable will give details on the related-work on privacy-preserving cryptographic protocols, as well as a complete list of open problems that the WP will study.

Project website

D2.1 Project website (DEC,PU, M03, ENSL) Project’s website (including project information, news, publications, etc.)

Publications

On the Ring-LWE and Polynomial-LWE Problems

Author(s): Miruna Rosca, Damien Stehlé, Alexandre Wallet
Published in: Advances in Cryptology – EUROCRYPT 2018, Issue 10820, 2018, Page(s) 146-173
DOI: 10.1007/978-3-319-78381-9_6

Estimate All the {LWE, NTRU} Schemes!

Author(s): Martin R. Albrecht, Benjamin R. Curtis, Amit Deo, Alex Davidson, Rachel Player, Eamonn W. Postlethwaite, Fernando Virdia, Thomas Wunderer
Published in: Security and Cryptography for Networks - 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedings, Issue 11035, 2018, Page(s) 351-367
DOI: 10.1007/978-3-319-98113-0_19

The General Sieve Kernel and New Records in Lattice Reduction

Author(s): Martin R. Albrecht, Léo Ducas, Gottfried Herold, Elena Kirshanova, Eamonn W. Postlethwaite, Marc Stevens
Published in: Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part II, Issue 11477, 2019, Page(s) 717-746
DOI: 10.1007/978-3-030-17656-3_25

Approx-SVP in Ideal Lattices with Pre-processing

Author(s): Alice Pellet-Mary, Guillaume Hanrot, Damien Stehlé
Published in: Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part II, Issue 11477, 2019, Page(s) 685-716
DOI: 10.1007/978-3-030-17656-3_24

Measuring, Simulating and Exploiting the Head Concavity Phenomenon in BKZ

Author(s): Shi Bai, Damien Stehlé, Weiqiang Wen
Published in: Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part I, Issue 11272, 2018, Page(s) 369-404
DOI: 10.1007/978-3-030-03326-2_13

$$\delta $$ -subgaussian Random Variables in Cryptography

Author(s): Sean Murphy, Rachel Player
Published in: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedings, Issue 11547, 2019, Page(s) 251-268
DOI: 10.1007/978-3-030-21548-4_14

Two-Message Statistically Sender-Private OT from LWE

Author(s): Zvika Brakerski, Nico Döttling
Published in: Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II, Issue 11240, 2018, Page(s) 370-390
DOI: 10.1007/978-3-030-03810-6_14

Learning Strikes Again: The Case of the DRS Signature Scheme

Author(s): Yang Yu, Léo Ducas
Published in: Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part II, Issue 11273, 2018, Page(s) 525-543
DOI: 10.1007/978-3-030-03329-3_18

LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS

Author(s): Jonathan Bootle, Claire Delaplace, Thomas Espitau, Pierre-Alain Fouque, Mehdi Tibouchi
Published in: Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part I, Issue 11272, 2018, Page(s) 494-524
DOI: 10.1007/978-3-030-03326-2_17

Lattice-Based Zero-Knowledge Arguments for Integer Relations

Author(s): Benoît Libert, San Ling, Khoa Nguyen, Huaxiong Wang
Published in: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II, Issue 10992, 2018, Page(s) 700-732
DOI: 10.1007/978-3-319-96881-0_24

Adaptively Secure Distributed PRFs from $$\mathsf {LWE}$$

Author(s): Benoît Libert, Damien Stehlé, Radu Titiu
Published in: Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II, Issue 11240, 2018, Page(s) 391-421
DOI: 10.1007/978-3-030-03810-6_15

Masking the GLP Lattice-Based Signature Scheme at Any Order

Author(s): Gilles Barthe, Sonia Belaïd, Thomas Espitau, Pierre-Alain Fouque, Benjamin Grégoire, Mélissa Rossi, Mehdi Tibouchi
Published in: Advances in Cryptology – EUROCRYPT 2018, Issue 10821, 2018, Page(s) 354-384
DOI: 10.1007/978-3-319-78375-8_12

Zero-Knowledge Elementary Databases with More Expressive Queries

Author(s): Benoît Libert, Khoa Nguyen, Benjamin Hong Meng Tan, Huaxiong Wang
Published in: Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I, Issue 11442, 2019, Page(s) 255-285
DOI: 10.1007/978-3-030-17253-4_9

Assessment of the Key-Reuse Resilience of NewHope

Author(s): Aurélie Bauer, Henri Gilbert, Guénaël Renault, Mélissa Rossi
Published in: Topics in Cryptology – CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4–8, 2019, Proceedings, Issue 11405, 2019, Page(s) 272-292
DOI: 10.1007/978-3-030-12612-4_14

Fully Secure Attribute-Based Encryption for t-CNF from LWE

Author(s): Rotem Tsabary
Published in: Advances in Cryptology – CRYPTO 2019, 2019

A Refined Analysis of the Cost for Solving LWE via uSVP

Author(s): Shi Bai, Shaun Miller, Weiqiang Wen
Published in: Progress in Cryptology – AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedings, Issue 11627, 2019, Page(s) 181-205
DOI: 10.1007/978-3-030-23696-0_10

Towards Practical Microcontroller Implementation of the Signature Scheme Falcon

Author(s): Tobias Oder, Julian Speith, Kira Höltgen, Tim Güneysu
Published in: Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papers, Issue 11505, 2019, Page(s) 65-80
DOI: 10.1007/978-3-030-25510-7_4

Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto

Author(s): Tobias Schneider, Clara Paglialonga, Tobias Oder, Tim Güneysu
Published in: Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, Issue 11443, 2019, Page(s) 534-564
DOI: 10.1007/978-3-030-17259-6_18

Attacks on the AJPS Mersenne-Based Cryptosystem

Author(s): Koen de Boer, Léo Ducas, Stacey Jeffery, Ronald de Wolf
Published in: Post-Quantum Cryptography, Issue 10786, 2018, Page(s) 101-120
DOI: 10.1007/978-3-319-79063-3_5

A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle Model

Author(s): Eike Kiltz, Vadim Lyubashevsky, Christian Schaffner
Published in: Advances in Cryptology – EUROCRYPT 2018, Issue 10822, 2018, Page(s) 552-586
DOI: 10.1007/978-3-319-78372-7_18

Shortest Vector from Lattice Sieving: A Few Dimensions for Free

Author(s): Léo Ducas
Published in: Advances in Cryptology – EUROCRYPT 2018, Issue 10820, 2018, Page(s) 125-145
DOI: 10.1007/978-3-319-78381-9_5

A Comparison of the Homomorphic Encryption Libraries HElib, SEAL and FV-NFLlib

Author(s): Carlos Aguilar Melchor, Marc-Olivier Kilijian, Cédric Lefebvre, Thomas Ricosset
Published in: Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8–9, 2018, Revised Selected Papers, Issue 11359, 2019, Page(s) 425-442
DOI: 10.1007/978-3-030-12942-2_32

More Efficient Algorithms for the NTRU Key Generation Using the Field Norm

Author(s): Thomas Pornin, Thomas Prest
Published in: Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, Issue 11443, 2019, Page(s) 504-533
DOI: 10.1007/978-3-030-17259-6_17

RLWE-Based Zero-Knowledge Proofs for Linear and Multiplicative Relations

Author(s): Ramiro Martínez, Paz Morillo
Published in: Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16–18, 2019, Proceedings, Issue 11929, 2019, Page(s) 252-277
DOI: 10.1007/978-3-030-35199-1_13

Order-LWE and the Hardness of Ring-LWE with Entropic Secrets

Author(s): Madalina Bolboceanu, Zvika Brakerski, Renen Perlman, Devika Sharma
Published in: Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II, Issue 11922, 2019, Page(s) 91-120
DOI: 10.1007/978-3-030-34621-8_4

Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control

Author(s): Zvika Brakerski, Yael Kalai
Published in: Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part II, Issue 12111, 2020, Page(s) 97-123
DOI: 10.1007/978-3-030-45388-6_4

Implementing RLWE-based Schemes Using an RSA Co-Processor

Author(s): Martin R. Albrecht Christian Hanser Andrea Hoeller Thomas Pöppelmann Fernando Virdia Andreas Wallner
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019
DOI: 10.13154/tches.v2019.i1.169-208

Cold Boot Attacks on Ring and Module LWE Keys Under the NTT

Author(s): Martin R. Albrecht Amit Deo Kenneth G. Paterson
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018
DOI: 10.13154/tches.v2018.i3.173-213

On the Shortness of Vectors to be found by the Ideal-SVP Quantum Algorithm

Author(s): Léo Ducas and Maxime Plançon and Benjamin Wesolowski
Published in: Advances in Cryptology -- CRYPTO 2019, Issue 1, 2019

Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model

Author(s): Don, Jelle; Fehr, Serge; Majenz, Christian; Schaffner, Christian
Published in: Advances in Cryptology -- CRYPTO 2019, Issue 1, 2019

Lattice-based proof of a shuffle

Author(s): Núria Costa, Ramiro Martínez, Paz Morillo
Published in: Voting, 2019

Multi-Client Functional Encryption for Linear Functions in the Standard Model from LWE

Author(s): Benoît Libert and Radu Titiu
Published in: ASIACRYPT 2019, 2019

Divisible E-Cash from Constrained Pseudo-Random Functions

Author(s): Florian Bourse, David Pointcheval and Olivier Sanders
Published in: ASIACRYPT 2019, 2019

Divisible E-Cash from Constrained Pseudo-Random Functions.

Author(s): Florian Bourse, David Pointcheval and Olivier Sanders
Published in: ASIACRYPT 2019 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, 2019

Multi-Client Functional Encryption for Linear Functions in the Stan- dard Model from LWE. Dec 2019, Kobe, Japan. pp.1-54.

Author(s): Benoît Libert and Radu Ţiţiu
Published in: ASIACRYPT 2019 - 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, 2019

On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption

Author(s): Benjamin R Curtis and Rachel Prayer
Published in: 7th Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC'19), 2019

Loop-Abort Faults on Lattice-Based Signatures and Key Exchange Protocols

Author(s): Thomas Espitau, Pierre-Alain Fouque, Benoit Gerard, Mehdi Tibouchi
Published in: IEEE Transactions on Computers, 2018, Page(s) 1-1, ISSN 0018-9340
DOI: 10.1109/tc.2018.2833119

CDT-based Gaussian Sampling: From Multi to Double Precision

Author(s): Thomas Ricosset, Carlos Aguilar-Melchor
Published in: IEEE Transactions on Computers, 2018, Page(s) 1-1, ISSN 0018-9340
DOI: 10.1109/tc.2018.2807839