The Ring-LWE Problem in Lattice-Based Cryptography: The Case of Twisted Embeddings [PDF]
Several works have characterized weak instances of the Ring-LWE problem by exploring vulnerabilities arising from the use of algebraic structures. Although these weak instances are not addressed by worst-case hardness theorems, enabling other ring ...
Jheyne N. Ortiz +4 more
doaj +2 more sources
How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption [PDF]
There exists a natural trade-off in public key encryption (PKE) schemes based on ring learning with errors (RLWE), namely: we would like a wider error distribution to increase the security, but it comes at the cost of an increased decryption failure rate
Jiabo Wang, Cong Ling
doaj +2 more sources
Fast Number Theoretic Transform for Ring-LWE on 8-bit AVR Embedded Processor [PDF]
In this paper, we optimized Number Theoretic Transform (NTT) and random sampling operations on low-end 8-bit AVR microcontrollers. We focused on the optimized modular multiplication with secure countermeasure (i.e., constant timing), which ensures high ...
Hwajeong Seo +6 more
doaj +2 more sources
Towards a Ring Analogue of the Leftover Hash Lemma [PDF]
The leftover hash lemma (LHL) is used in the analysis of various lattice-based cryptosystems, such as the Regev and Dual-Regev encryption schemes as well as their leakage-resilient counterparts. The LHL does not hold in the ring setting, when the ring is
Dachman-Soled Dana +3 more
doaj +3 more sources
CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes [PDF]
This paper proposes a practical hybrid solution for combining and switching between three popular Ring-LWE-based FHE schemes: TFHE, B/FV and HEAAN. This is achieved by first mapping the different plaintext spaces to a common algebraic structure and then ...
Boura Christina +3 more
doaj +5 more sources
(In)Security of Ring-LWE Under Partial Key Exposure
We initiate the study of partial key exposure in Ring-LWE (RLWE)-based cryptosystems. Specifically, we (1) Introduce the search and decision Leaky R-LWE assumptions (Leaky R-SLWE, Leaky R-DLWE), to formalize the hardness of search/decision RLWE under ...
Dachman-Soled Dana +3 more
doaj +3 more sources
An MLWE-Based Cut-and-Choose Oblivious Transfer Protocol [PDF]
The existing lattice-based cut-and-choose oblivious transfer protocol is constructed based on the learning-with-errors (LWE) problem, which generally has the problem of inefficiency.
Yongli Tang +5 more
doaj +2 more sources
A novel framework for secure cryptocurrency transactions using quantum crypto guard [PDF]
In today’s digital world, cryptocurrencies like Bitcoin can secure transactions without banks. However, the rise of quantum computing poses significant threats to their security, as traditional cryptographic methods may be easily compromised. In addition,
Jamil Abedalrahim Jamil Alsayaydeh +4 more
doaj +3 more sources
A Post-Quantum Public-Key Signcryption Scheme over Scalar Integers Based on a Modified LWE Structure [PDF]
To ensure confidentiality and integrity in the era of quantum computing, most post-quantum cryptographic schemes are designed to achieve either encryption or digital signature functionalities separately.
Mostefa Kara +3 more
doaj +2 more sources
Practical CCA2-Secure and Masked Ring-LWE Implementation
During the last years public-key encryption schemes based on the hardness of ring-LWE have gained significant popularity. For real-world security applications assuming strong adversary models, a number of practical issues still need to be addressed.
Tobias Oder +3 more
doaj +4 more sources

