搜索结果: 1-15 共查到“密码学 Lattice-based”相关记录100条 . 查询时间(0.109 秒)
Generic Side-channel attacks on CCA-secure lattice-based PKE and KEM schemes
Lattice based cryptography side-channel attacks CCA transformation
font style='font-size:12px;'>
2019/8/21
In this article, we demonstrate practical side-channel assisted chosen-ciphertext attacks (CCA) over multiple CCA-secure lattice-based public-key encryption schemes (PKE) and key-encapsulation mechani...
Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto
Masking Post-quantum Cryptography
font style='font-size:12px;'>
2019/8/8
With the rising popularity of lattice-based cryptography, the Learning with Errors (LWE) problem has emerged as a fundamental core of numerous encryption and key exchange schemes. Many LWE-based schem...
WIDESEAS: A lattice-based PIR scheme implemented in EncryptedQuery
Private Information Retrieval PIR homomorphic encryption
font style='font-size:12px;'>
2019/7/24
We introduce the WIDESEAS protocol for lattice-based Private Information Retrieval (PIR), and we give performance numbers for its recent implementation in the EncryptedQuery open-source PIR software. ...
Exploiting Determinism in Lattice-based Signatures - Practical Fault Attacks on pqm4 Implementations of NIST candidates
Deterministic Lattice Signatures pqm4 Fault Attack
font style='font-size:12px;'>
2019/7/8
In this paper, we analyze the implementation level fault vulnerabilities of deterministic lattice-based signature schemes. In particular, we extend the practicality of skip-addition fault attacks thro...
Lattice-Based Remote User Authentication from Reusable Fuzzy Signature
Lattice-Based Cryptography Fuzzy Signatures Biometrics Reusability
font style='font-size:12px;'>
2019/6/26
In this paper, we introduce a new construction of lattice-based reusable fuzzy signature for remote user authentication that is secure against quantum computers. We define formal security models for t...
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications
Lattice Zero-Knowledge Argument
font style='font-size:12px;'>
2019/6/26
We provide new zero-knowledge argument of knowledge systems that work directly for a wide class of language, namely, ones involving the satisfiability of matrix-vector relations and integer relations ...
Comparing proofs of security for lattice-based encryption
lattice-based cryptography security proofs
font style='font-size:12px;'>
2019/6/13
This paper describes the limits of various "security proofs", using 36 lattice-based KEMs as case studies. This description allows the limits to be systematically compared across these KEMs; shows tha...
Lattice-based Cryptography for IoT in A Quantum World: Are We Ready?
Quantum Safe cryptography Post quantum cryptography IoT security
font style='font-size:12px;'>
2019/6/12
The impending realization of scalable quantum computers has led to active research in Post Quantum Cryptography (PQC). The challenge is harder for embedded IoT (edge) devices, due to their pervasive d...
Visualizing size-security tradeoffs for lattice-based encryption
lattice-based cryptography security estimates network traffic
font style='font-size:12px;'>
2019/6/5
There are many proposed lattice-based encryption systems. How do these systems compare in the security that they provide against known attacks, under various limits on communication volume? There are ...
Algebraic Techniques for Short(er) Exact Lattice-Based Zero-Knowledge Proofs
Lattices Zero-Knowledge Proofs Commitments
font style='font-size:12px;'>
2019/6/4
A key component of many lattice-based protocols is a zero-knowledge proof of knowledge of a vector s⃗ s→ with small coefficients satisfying As⃗ =u⃗ modqAs→=u→modq. While there exist ...
Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based Cryptography
zero-knowledge lattice cryptography MPC
font style='font-size:12px;'>
2019/5/23
In this work we present a new interactive Zero-Knowledge Argument of knowledge for general arithmetic circuits. Our protocol is based on the ``MPC-in-the-head''-paradigm of Ishai et al. (STOC 2009) an...
GALACTICS: Gaussian Sampling for Lattice-Based Constant-Time Implementation of Cryptographic Signatures, Revisited
Timing Attack Phase Retrieval algorithms Constant-time Implementation
font style='font-size:12px;'>
2019/5/21
In this paper, we propose a constant-time implementation of the BLISS lattice-based signature scheme. BLISS is possibly the most efficient lattice-based signature scheme proposed so far, with a level ...
Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications
lattice-based cryptography zero-knowledge proof CRT packing, ring signature
font style='font-size:12px;'>
2019/5/9
We devise new techniques for design and analysis of efficient lattice-based zero-knowledge proofs (ZKP). First, we introduce one-shot proof techniques for non-linear polynomial relations of degree k≥2...
Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution
Lattice cryptography Public-key encryption Noisy ElGamal
font style='font-size:12px;'>
2019/4/22
Lattice-based public-key encryption has a large number of design choices that can be combined in diverse ways to obtain different tradeoffs. One of these choices is the distribution from which secret ...
Lattice-based proof of a shuffle
mix-nets, e-voting post-quantum RLWE encryption
font style='font-size:12px;'>
2019/4/10
In this paper we present the first fully post-quantum proof of a shuffle for RLWE encryption schemes. Shuffles are commonly used to construct mixing networks (mix-nets), a key element to ensure anonym...