In this paper, we analyze the security of cryptosystems using short generators over ideal lattices such as candidate multilinear maps by Garg, Gentry and Halevi and fully homomorphic encryption by Smart and Vercauteren. Our approach is based on a recent work by Cramer, Ducas, Peikert and Regev on analysis of recovering a short generator of an ideal in the $q$-th cyclotomic field for a prime power $q$. In their analysis, implicit lower bounds of the special values of Dirichlet $L$-functions at 1 are essentially used for estimating some sizes of the dual basis in the log-unit lattice of the $q$-th cyclotomic field. Our main contribution is to improve Cramer et al.\u27s analysis by giving explicit lower and upper bounds of the special values o...
International audienceThe Principal Ideal Problem (resp. Short Principal Ideal Problem), shorten as ...
Some recent cryptographic schemes rely on the hardness of finding a shortest generator of a principa...
In this note, we describe a quantum polynomial time attack on the cryptosystems<br>based on the hard...
Abstract. In this paper, we analyze the security of cryptosystems using short generators over ideal ...
Abstract: A handful of recent cryptographic proposals rely on the conjectured hardness of the follow...
Several recent cryptographic constructions - including a public key encryption scheme, a fully homom...
Finding a short element $g$ of a number field, given the ideal generated by $g$, is a classic proble...
Abstract: A handful of recent cryptographic proposals rely on the conjectured hardness of the follow...
A family of ring-based cryptosystems, including the multilinear maps of Garg, Gentry and Halevi [Can...
A handful of recent cryptographic proposals rely on the conjectured hardness of the following proble...
© 2020 A. Lesavourey et al., published by De Gruyter 2020. One family of candidates to build a post-...
International audienceThe Principal Ideal Problem (resp. Short Principal Ideal Problem), shorten as ...
International audienceThe Principal Ideal Problem (resp. Short Principal Ideal Problem), shorten as ...
International audienceThe Principal Ideal Problem (resp. Short Principal Ideal Problem), shorten as ...
International audienceThe Principal Ideal Problem (resp. Short Principal Ideal Problem), shorten as ...
International audienceThe Principal Ideal Problem (resp. Short Principal Ideal Problem), shorten as ...
Some recent cryptographic schemes rely on the hardness of finding a shortest generator of a principa...
In this note, we describe a quantum polynomial time attack on the cryptosystems<br>based on the hard...
Abstract. In this paper, we analyze the security of cryptosystems using short generators over ideal ...
Abstract: A handful of recent cryptographic proposals rely on the conjectured hardness of the follow...
Several recent cryptographic constructions - including a public key encryption scheme, a fully homom...
Finding a short element $g$ of a number field, given the ideal generated by $g$, is a classic proble...
Abstract: A handful of recent cryptographic proposals rely on the conjectured hardness of the follow...
A family of ring-based cryptosystems, including the multilinear maps of Garg, Gentry and Halevi [Can...
A handful of recent cryptographic proposals rely on the conjectured hardness of the following proble...
© 2020 A. Lesavourey et al., published by De Gruyter 2020. One family of candidates to build a post-...
International audienceThe Principal Ideal Problem (resp. Short Principal Ideal Problem), shorten as ...
International audienceThe Principal Ideal Problem (resp. Short Principal Ideal Problem), shorten as ...
International audienceThe Principal Ideal Problem (resp. Short Principal Ideal Problem), shorten as ...
International audienceThe Principal Ideal Problem (resp. Short Principal Ideal Problem), shorten as ...
International audienceThe Principal Ideal Problem (resp. Short Principal Ideal Problem), shorten as ...
Some recent cryptographic schemes rely on the hardness of finding a shortest generator of a principa...
In this note, we describe a quantum polynomial time attack on the cryptosystems<br>based on the hard...