• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Sun Xiaochao, Li Bao, and Lu Xianhui. LWE Problem with Uniform Secret and Errors and Its Application[J]. Journal of Computer Research and Development, 2014, 51(7): 1515-1519.
Citation: Sun Xiaochao, Li Bao, and Lu Xianhui. LWE Problem with Uniform Secret and Errors and Its Application[J]. Journal of Computer Research and Development, 2014, 51(7): 1515-1519.

LWE Problem with Uniform Secret and Errors and Its Application

More Information
  • Published Date: July 14, 2014
  • The learning with errors (LWE) assumption has been widely applied in cryptography for its unique properties in complexity. It is viewed as linear random decoding problem in Euclidian norm. Many variants of its average hardness are given in recent years. We introduce a variant of learning with errors problem in which the coordinates of secret and errors are all chosen from the uniform distribution over a small interval, where we use a transformation technique given by Applebaum et al. It maps LWE samples with uniform secret to LWE samples with the secret which accords to the same distribution of the errors. Meanwhile, there are only a small number of samples lost. The average hardness of our variant is based on the LWE with uniform errors. It enjoys a worst-to-average-case reduction and removes the gaussian sampler. We also construct a public-key encryption with key-dependent message security based on our new LWE variant. It is a variant of Regevs LWE-based schemes. Our scheme reduces the computational overhead of algorithms of key-generation and encryption by replacing the gaussian sampler, which costs a lot of time and space in practice, with the uniform sampler in small interval.
  • Related Articles

    [1]Liu Yongzhi, Qin Guiyun, Liu Pengtao, Hu Chengyu, Guo Shanqing. Provably Secure Public Key Authenticated Encryption with Keyword Search Based on SGX[J]. Journal of Computer Research and Development, 2023, 60(12): 2709-2724. DOI: 10.7544/issn1000-1239.202220478
    [2]Yang Ningbin, Zhou Quan, Xu Shumei. Public-Key Authenticated Encryption with Keyword Search Without Pairings[J]. Journal of Computer Research and Development, 2020, 57(10): 2125-2135. DOI: 10.7544/issn1000-1239.2020.20200318
    [3]Li Chunhua, Wang Hua, Zhang Yanzhe, Zhou Ke. Optimization for Broadcast Encryption in Cloud Using Extended Public Key[J]. Journal of Computer Research and Development, 2017, 54(12): 2818-2824. DOI: 10.7544/issn1000-1239.2017.20170902
    [4]Chen Zhigang, Song Xinxia, Zhao Xiufeng. A Multi-Bit Fully Homomorphic Encryption with Better Key Size from LWE[J]. Journal of Computer Research and Development, 2016, 53(10): 2216-2223. DOI: 10.7544/issn1000-1239.2016.20160431
    [5]Zhong Ting, Han Xiao, Zhao Yulong. Provable Data Possession by Partial Delegation[J]. Journal of Computer Research and Development, 2015, 52(10): 2422-2430. DOI: 10.7544/issn1000-1239.2015.20150515
    [6]Wen Weiqiang, Wang Libin. A Strongly Secure Lattice-Based Key Exchange Protocol[J]. Journal of Computer Research and Development, 2015, 52(10): 2258-2269. DOI: 10.7544/issn1000-1239.2015.20150518
    [7]Fu Wei, Wu Xiaoping, Ye Qing, Xiao Nong, Lu Xicheng. A Multiple Replica Possession Proving Scheme Based on Public Key Partition[J]. Journal of Computer Research and Development, 2015, 52(7): 1672-1681. DOI: 10.7544/issn1000-1239.2015.20140353
    [8]Yang Chao, Zhang Junwei, Dong Xuewen, Ma Jianfeng. Proving Method of Ownership of Encrypted Files in Cloud De-Duplication Deletion[J]. Journal of Computer Research and Development, 2015, 52(1): 248-258. DOI: 10.7544/issn1000-1239.2015.20130544
    [9]Ren Yongjun, Wang Jiandong, Xu Dazhuan, Zhuang Yi, Wang Jian. Key Agreement Protocol for Wireless Sensor Networks Using Self-Certified Public Key System[J]. Journal of Computer Research and Development, 2012, 49(2): 304-311.
    [10]Xu Peng, Cui Guohua, and Lei Fengyu. An Efficient and Provably Secure IBE Scheme Without Bilinear Map[J]. Journal of Computer Research and Development, 2008, 45(10): 1687-1695.

Catalog

    Article views (1667) PDF downloads (721) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return