A decade of lattice cryptography

C Peikert - Foundations and trends® in theoretical computer …, 2016 - nowpublishers.com
Lattice-based cryptography is the use of conjectured hard problems on point lattices in Rn
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …

On the concrete hardness of learning with errors

MR Albrecht, R Player, S Scott - Journal of Mathematical Cryptology, 2015 - degruyter.com
The learning with errors (LWE) problem has become a central building block of modern
cryptographic constructions. This work collects and presents hardness results for concrete …

Indistinguishability obfuscation from well-founded assumptions

A Jain, H Lin, A Sahai - Proceedings of the 53rd annual ACM SIGACT …, 2021 - dl.acm.org
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile
programs into unintelligible ones while preserving functionality. It is a fascinating and …

The discrete gaussian for differential privacy

CL Canonne, G Kamath… - Advances in Neural …, 2020 - proceedings.neurips.cc
A key tool for building differentially private systems is adding Gaussian noise to the output of
a function evaluated on a sensitive dataset. Unfortunately, using a continuous distribution …

[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process

G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang… - 2022 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …

Quantum2FA: Efficient quantum-resistant two-factor authentication scheme for mobile devices

Q Wang, D Wang, C Cheng… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Smart-card based password authentication has been the most widely used two-factor
authentication (2FA) mechanism for security-critical applications (eg, e-Health, smart grid …

Efficient medical big data management with keyword-searchable encryption in healthchain

C Li, M Dong, J Li, G Xu, XB Chen, W Liu… - IEEE Systems …, 2022 - ieeexplore.ieee.org
Along with applying blockchain technology in the health care service system (HSS), many
distributed solutions have been proposed to solve the centralized, data island problems …

[PDF][PDF] Falcon: Fast-Fourier lattice-based compact signatures over NTRU

PA Fouque, J Hoffstein, P Kirchner… - Submission to the NIST's …, 2018 - di.ens.fr
This document is the supporting documentation of Falcon. It is organized as follows. Chapter
2 explains the overall design of Falcon and its rationale. Chapter 3 is a complete …

Post-quantum key {Exchange—A} new hope

E Alkim, L Ducas, T Pöppelmann… - 25th USENIX Security …, 2016 - usenix.org
At IEEE Security & Privacy 2015, Bos, Costello, Naehrig, and Stebila proposed an
instantiation of Peikert's ring-learning-with-errors–based (Ring-LWE) key exchange protocol …

Oblivious key-value stores and amplification for private set intersection

G Garimella, B Pinkas, M Rosulek, N Trieu… - Advances in Cryptology …, 2021 - Springer
Many recent private set intersection (PSI) protocols encode input sets as polynomials. We
consider the more general notion of an oblivious key-value store (OKVS), which is a data …