6 Hits in 2.6 sec

Learning with Rounding, Revisited [chapter]

Joël Alwen, Stephan Krenn, Krzysztof Pietrzak, Daniel Wichs
2013 Lecture Notes in Computer Science  
The LWR problem was shown to be as hard as LWE for a setting of parameters where the modulus and modulus-to-error ratio are super-polynomial.  ...  Our approach is inspired by a technique of Goldwasser et al. from ICS '10, which implicitly showed the existence of a "lossy mode" for LWE.  ...  This work was partly funded by the European Research Council under ERC Starting Grant 259668-PSPC and ERC Advanced Grant 321310-PERCY.  ... 
doi:10.1007/978-3-642-40041-4_4 fatcat:ttlw23ggujh5fdb6cmnudibfka

Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting [chapter]

Xiang Xie, Rui Xue, Rui Zhang
2012 Lecture Notes in Computer Science  
In addition, the security of our scheme is based on the hardness of the learning with errors (LWE) problem which remains hard even for quantum algorithms.  ...  In CRYPTO'11, Brakerski and Segev formalized a framework for studying the security of deterministic public key encryption schemes with respect to auxiliary inputs.  ...  Acknowledgements Xiang Xie would like to thank Chris Peikert for many helpful discussions.  ... 
doi:10.1007/978-3-642-32928-9_1 fatcat:ht3xsmgfqndbjixqqqgpsfsjry

A Cryptographic Test of Quantumness and Certifiable Randomness from a Single Quantum Device [article]

Zvika Brakerski, Paul Christiano, Urmila Mahadev, Umesh Vazirani, Thomas Vidick
2021 arXiv   pre-print
We show how to construct this primitive based on the hardness of the learning with errors (LWE) problem.  ...  In this model we propose solutions to two tasks - a protocol for efficient classical verification that the untrusted device is "truly quantum," and a protocol for producing certifiable randomness from  ...  We refer to Section 2 for definitions of entropic quantities. It is known that LWE is hard even with binary secrets.  ... 
arXiv:1804.00640v4 fatcat:vq6krtdnvve65jtvmlak2v5ljq

Obfuscating Compute-and-Compare Programs under LWE

Daniel Wichs, Giorgos Zirdelis
2017 2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS)  
(ITCS '16) which constructed a conjunction obfuscator under a non-standard "entropic" ring-LWE assumption, while here we obfuscate a significantly broader class of programs under standard LWE.  ...  Furthermore, we show that our obfuscator gives new circular-security counter-examples for public-key bit encryption and for unbounded length key cycles.  ...  very recently conjunction obfuscators, first using multi-linear maps [BR13] and later a variant of Ring LWE called "entropic Ring LWE" [BVWW16] .  ... 
doi:10.1109/focs.2017.61 dblp:conf/focs/WichsZ17 fatcat:vw6qdii6y5gbbcrw2lb3vxrgkq

Star-specific Key-homomorphic PRFs from Linear Regression and Extremal Set Theory [article]

Vipin Singh Sehrawat, Foo Yee Yeo, Dmitriy Vassilyev
2022 arXiv   pre-print
We reduce the security of our SSKH PRF family to the hardness of LWE.  ...  For the same purpose, we define and compute the mutual information between different linear regression hypotheses that are generated via overlapping training datasets.  ...  Multiple variants of LWE such as ring LWE [204] , module LWE [188] , cyclic LWE [150] , continuous LWE [77] , PRIM LWE [278] , middle-product LWE [267] , group LWE [127] , entropic LWE [76] , universal  ... 
arXiv:2205.00861v1 fatcat:6nimmkefnzedrc2hujlynj6sju

Advances in Quantum Cryptography

Stefano Pirandola, Ulrik Andersen, Leonardo Banchi, Mario Berta, Darius Bunandar, Roger Colbeck, Dirk Englund, Tobias Gehring, Cosmo Lupo, Carlo Ottaviani, Jason Pereira, Mohsen Razavi (+6 others)
2020 Advances in Optics and Photonics  
General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications  ...  that users recognise and abide by the legal requirements associated with these rights.  Users may download and print one copy of any publication from the public portal for the purpose of private study  ...  Eve in a purely lossy channel.  ... 
doi:10.1364/aop.361502 fatcat:7xp7i42fjffpblk6g4fhlpgg6m