搜索结果: 16-30 共查到“军事学 Ring-LWE”相关记录53条 . 查询时间(0.062 秒)
The Ring Learning With Errors problem (RLWE) comes in various forms. Vanilla RLWE is the decision dual-RLWE variant, consisting in distinguishing from uniform a distribution depending on a secret belo...
Faster AVX2 optimized NTT multiplication for Ring-LWE lattice cryptography
lattice cryptography NTT implementation
2018/1/11
Constant-time polynomial multiplication is one of the most time-consuming operations in many lattice-based cryptographic constructions. For schemes based on the hardness of Ring-LWE in power-of-two cy...
Batched Multi-hop Multi-key FHE from ring-LWE with Compact Ciphertext Extension
multikey FHE batching BGV FHE
2017/9/25
Traditional fully homomorphic encryption (FHE) schemes support computation on data encrypted under a single key. In STOC 2012, López-Alt et al. introduced the notion of multi-key FHE (MKFHE), which al...
Implementing Conjunction Obfuscation under Entropic Ring LWE
lattice techniques program obfuscation conjunction
2017/9/7
We address the practicality challenges of secure program obfuscation by developing, implementing and experimentally assessing an approach to securely obfuscate conjunction programs in software. Conjun...
Noise Distributions in Homomorphic Ring-LWE
Ring Learning with Errors Subgaussian Random Variable Homomorphic Encryption
2017/7/24
We develop a statistical framework to analyse the Ring-LWE processes of A Toolkit for Ring-LWE Cryptography (Eurocrypt 2013) and similar processes. We consider the δδ-subgaussian random variables used...
In this work, we describe an integer version of ring-LWE over the polynomial rings and prove that its hardness is equivalent to one of the polynomial ring-LWE. Moreover, we also present a public key c...
Large Modulus Ring-LWE ≥ Module-LWE
security reduction learning with errors lattice-based cryptography
2017/6/27
We present a reduction from the module learning with errors problem (MLWE) in dimension dd and with modulus qq to the ring learning with errors problem (RLWE) with modulus qdqd. Our reduction increase...
Obfuscation of Bloom Filter Queries from Ring-LWE
obfuscation virtual black-box Bloom filters
2017/5/25
We devise a virtual black-box (VBB) obfuscator for querying whether set elements are stored within Bloom filters, with security based on the Ring Learning With Errors (RLWE) problem and strongly unive...
On Reliability, Reconciliation, and Error Correction in Ring-LWE Encryption
Ring-LWE Reconciliation Post-Quantum Encryption
2017/5/23
We describe a new reconciliation method for Ring-LWE that has a significantly smaller failure rate than previous proposals while reducing ciphertext size and the amount of randomness required. It is b...
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts
public-key cryptography Ring-LWE
2017/4/27
We provide a tight security proof for an IND-CCA Ring-LWE based Key Encapsulation Mechanism that is derived from a generic construction of Dent (IMA Cryptography and Coding, 2003). Such a tight reduct...
Multilinear Maps Using a Variant of Ring-LWE
Multilinear maps ring-LWE multipartite key exchange
2017/4/24
GGH13, CLT13 and GGH15 of multilinear maps suffer from zeroizing attacks. In this paper, we present a new construction of multilinear maps using a variant of ring-LWE. The security of our construction...
Pseudorandomness of Ring-LWE for Any Ring and Modulus
Learning with Errors lattice-based cryptography worst-case to average-case reduction
2017/3/27
We give a polynomial-time quantum reduction from worst-case (ideal) lattice problems directly to the decision version of (Ring-)LWE. This extends to decision all the worst-case hardness results that w...
Challenges for Ring-LWE
Ring-LWR challenges cryptanalysis
2016/12/10
As lattice cryptography becomes more widely used in practice, there is an increasing need for further cryptanalytic effort and higher-confidence security estimates for its underlying computational pro...
We present Tesla# (pronounced "Tesla Sharp"), a digital signature scheme based on the RLWE assumption that continues a recent line of proposals of lattice-based digital signature schemes originating i...
Ring-LWE Ciphertext Compression and Error Correction: Tools for Lightweight Post-Quantum Cryptography
Practical Post-Quantum Cryptography Lattice Cryptography Ring-LWE
2016/12/7
Some lattice-based public key cryptosystems allow one to transform ciphertext from one lattice or ring representation to another efficiently and without knowledge of public and private keys. In this w...