all InfoSec news
Simulation-Secure Threshold PKE from LWE with Polynomial Modulus
Nov. 13, 2023, 6 a.m. |
IACR News www.iacr.org
ePrint Report: Simulation-Secure Threshold PKE from LWE with Polynomial Modulus
Daniele Micciancio, Adam Suhl
In LWE based cryptosystems, using small (polynomially large) ciphertext modulus improves both efficiency and security.
In threshold encryption, one often needs "simulation security": the ability to simulate decryption shares without the secret key.
Existing lattice-based threshold encryption schemes provide one or the other but not both.
Simulation security has seemed to require superpolynomial flooding noise,
and the schemes with polynomial modulus use Rényi divergence based analyses …
adam ciphertext decryption efficiency encryption eprint report key large report secret secret key security simulation threshold
More from www.iacr.org / IACR News
Regev Factoring Beyond Fibonacci: Optimizing Prefactors
1 day, 19 hours ago |
www.iacr.org
NTRU-based FHE for Larger Key and Message Space
1 day, 19 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Senior Security Researcher, SIEM
@ Huntress | Remote Canada
Senior Application Security Engineer
@ Revinate | San Francisco Bay Area
Cyber Security Manager
@ American Express Global Business Travel | United States - New York - Virtual Location
Incident Responder Intern
@ Bentley Systems | Remote, PA, US
SC2024-003533 Senior Online Vulnerability Assessment Analyst (CTS) - THU 9 May
@ EMW, Inc. | Mons, Wallonia, Belgium