On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL [PDF]
We present novel variants of the dual-lattice attack against LWE in the presence of an unusually short secret. These variants are informed by recent progress in BKW-style algorithms for solving LWE.
Albrecht, Martin
core +5 more sources
Efficient Batch Fully Homomorphic Encryption with a Shorter Key from Ring-LWE
Fully homomorphic encryption allows users to use the computing resources of cloud servers for the computation of encrypted data without worrying about data leakage.
Yuyue Chen, Ruwei Huang, Bo Yang
doaj +1 more source
Efficient Fully homomorphic encryption scheme using Ring-LWE [PDF]
Abstract Data can be stored and processed in an encrypted format using fully homomorphic encryption, which makes cloud computing provider can process data well without even knowing data information. However, most existing homomorphic encryption schemes based on ring learning with errors, focus on the special classes of rings, such as ...
Dan Xin +4 more
openaire +1 more source
Analysis of Error Dependencies on Newhope
Among many submissions to NIST post-quantum cryptography (PQC) project, NewHope is a promising key encapsulation mechanism (KEM) based on the Ring-Learning with errors (Ring-LWE) problem.
Minki Song +5 more
doaj +1 more source
Consortium Blockchain Data Sharing Scheme Using Lattice Ciphertext Policy Attribute-Based Encryption [PDF]
In the process of data sharing, problems of data leakage and trust crisis can arise, and with the emergence of quantum computers, the threat to traditional encryption algorithms is greater.
Lingyun ZHANG, Yuling CHEN
doaj +1 more source
Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols
Public key cryptography protocols, such as RSA and elliptic curve cryptography, will be rendered insecure by Shor’s algorithm when large-scale quantum computers are built.
Utsav Banerjee +2 more
doaj +1 more source
FPGA-Based Hardware Accelerator for Leveled Ring-LWE Fully Homomorphic Encryption
Fully homomorphic encryption (FHE) allows arbitrary computation on encrypted data and has great potential in privacy-preserving cloud computing and securely outsource computational tasks.
Yang Su +3 more
doaj +1 more source
A lightweight McEliece cryptosystem co-processor design [PDF]
Due to the rapid advances in the development of quantum computers and their susceptibility to errors, there is a renewed interest in error correction algorithms.
Agrawal, Rashmi +3 more
core +2 more sources
Post-quantum cryptographic hardware primitives [PDF]
The development and implementation of post-quantum cryptosystems have become a pressing issue in the design of secure computing systems, as general quantum computers have become more feasible in the last two years.
Agrawal, Rashmi +3 more
core
A Subfield Lattice Attack on Overstretched NTRU Assumptions:Cryptanalysis of Some FHE and Graded Encoding Schemes [PDF]
International ...
A Ferraguti +37 more
core +5 more sources

