(In)Security of Ring-LWE Under Partial Key Exposure
We initiate the study of partial key exposure in Ring-LWE (RLWE)-based cryptosystems. Specifically, we (1) Introduce the search and decision Leaky R-LWE assumptions (Leaky R-SLWE, Leaky R-DLWE), to formalize the hardness of search/decision RLWE under leakage of some fraction of coordinates of the NT...
Main Authors: | Dachman-Soled Dana, Gong Huijing, Kulkarni Mukul, Shahverdi Aria |
---|---|
Format: | Article |
Language: | English |
Published: |
De Gruyter
2020-11-01
|
Series: | Journal of Mathematical Cryptology |
Subjects: | |
Online Access: | https://doi.org/10.1515/jmc-2020-0075 |
Similar Items
-
Towards a Ring Analogue of the Leftover Hash Lemma
by: Dachman-Soled Dana, et al.
Published: (2020-11-01) -
Discretisation and Product Distributions in Ring-LWE
by: Murphy Sean, et al.
Published: (2020-11-01) -
CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes
by: Boura Christina, et al.
Published: (2020-08-01) -
R-LWE-Based Distributed Key Generation and Threshold Decryption
by: Alborch, F., et al.
Published: (2022) -
High-Secure Fingerprint Authentication System Using Ring-LWE Cryptography
by: Tuy Nguyen Tan, et al.
Published: (2019-01-01)