Results 11 to 20 of about 2,659 (196)
Provably weak instances of ring-LWE revisited [PDF]
In CRYPTO 2015, Elias, Lauter, Ozman and Stange described an attack on the non-dual decision version of the ring learning with errors problem (RLWE) for two special families of defining polynomials, whose construction depends on the modulus q that is ...
J Hoffstein +9 more
core +5 more sources
Ring-LWE Cryptography for the Number Theorist [PDF]
In this paper, we survey the status of attacks on the ring and polynomial learning with errors problems (RLWE and PLWE). Recent work on the security of these problems [Eisentr\"ager-Hallgren-Lauter, Elias-Lauter-Ozman-Stange] gives rise to interesting ...
Elias, Yara +3 more
core +5 more sources
Obfuscating Conjunctions under Entropic Ring LWE [PDF]
We show how to securely obfuscate conjunctions, which are functions f(x[subscript 1], . . . , x[subscript n]) = ∧[subscript i∈I] y[superscript i] where I ⊆ [n] and each literal y[subscript i] is either just x[subscript i] or ¬x[subscript i] e.g., f(x ...
Brakerski, Zvika +3 more
core +8 more sources
Additively homomorphic ring-LWE masking [PDF]
In this paper, we present a new masking scheme for ring LWE decryption. Our scheme exploits the additively-homomorphic property of the existing ring-LWE encryption schemes and computes an additive-mask as an encryption of a random message.
de Clercq, Ruan +4 more
core +3 more sources
(In)Security of Ring-LWE Under Partial Key Exposure
We initiate the study of partial key exposure in Ring-LWE (RLWE)-based cryptosystems. Specifically, we (1) Introduce the search and decision Leaky R-LWE assumptions (Leaky R-SLWE, Leaky R-DLWE), to formalize the hardness of search/decision RLWE under ...
Dachman-Soled Dana +3 more
doaj +3 more sources
Towards a Ring Analogue of the Leftover Hash Lemma [PDF]
The leftover hash lemma (LHL) is used in the analysis of various lattice-based cryptosystems, such as the Regev and Dual-Regev encryption schemes as well as their leakage-resilient counterparts. The LHL does not hold in the ring setting, when the ring is
Dachman-Soled Dana +3 more
doaj +3 more sources
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts [PDF]
We provide a tight security proof for an IND-CCA Ring-LWE based Key Encapsulation Mechanism that is derived from a generic construction of Dent (IMA Cryptography and Coding, 2003). Such a tight reduction is not known for the generic construction.
AW Dent +23 more
core +4 more sources
Practical CCA2-Secure and Masked Ring-LWE Implementation
During the last years public-key encryption schemes based on the hardness of ring-LWE have gained significant popularity. For real-world security applications assuming strong adversary models, a number of practical issues still need to be addressed.
Tobias Oder +3 more
doaj +4 more sources
Large Modulus Ring-LWE > Module-LWE [PDF]
We present a reduction from the module learning with errors problem (MLWE) in dimension \(d\) and with modulus \(q\) to the ring learning with errors problem (RLWE) with modulus \(q^{d}\). Our reduction increases the LWE error rate \(\alpha \) by a quadratic factor in the ring dimension \(n\) and a square root in the module rank \(d\) for power-of-two ...
Albrecht, Martin, Deo, Amit
core +2 more sources
Characterizing Disease Severity Through Surgical Recurrence Rates in Idiopathic Subglottic Stenosis. [PDF]
The following investigation examined endoscopic surgical interval rates across a patient with idiopathic subglottic stenosis (iSGS) first 2 years of treatment compared to their last 3 years of treatment over a total of 5 years of follow up. Through comparison of these two intervals a disease severity classification for iSGS based on decreasing ...
Bowen AJ +15 more
europepmc +2 more sources

