{"id":"https://openalex.org/W2076213784","doi":"https://doi.org/10.1145/2600694.2600695","title":"Provably secure LWE encryption with smallish uniform noise and secret","display_name":"Provably secure LWE encryption with smallish uniform noise and secret","publication_year":2014,"publication_date":"2014-05-30","ids":{"openalex":"https://openalex.org/W2076213784","doi":"https://doi.org/10.1145/2600694.2600695","mag":"2076213784"},"language":"en","primary_location":{"id":"doi:10.1145/2600694.2600695","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2600694.2600695","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd ACM workshop on ASIA public-key cryptography","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006503080","display_name":"Daniel Cabarcas","orcid":null},"institutions":[{"id":"https://openalex.org/I36243813","display_name":"Universidad Nacional de Colombia","ror":"https://ror.org/059yx9a68","country_code":"CO","type":"education","lineage":["https://openalex.org/I36243813"]}],"countries":["CO"],"is_corresponding":true,"raw_author_name":"Daniel Cabarcas","raw_affiliation_strings":["Universidad Nacional de Colombia, sede Medell\u00edn, Medell\u00edn, Colombia"],"affiliations":[{"raw_affiliation_string":"Universidad Nacional de Colombia, sede Medell\u00edn, Medell\u00edn, Colombia","institution_ids":["https://openalex.org/I36243813"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089957629","display_name":"Florian G\u00f6pfert","orcid":null},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Florian G\u00f6pfert","raw_affiliation_strings":["Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084539633","display_name":"Patrick Weiden","orcid":null},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Patrick Weiden","raw_affiliation_strings":["Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5006503080"],"corresponding_institution_ids":["https://openalex.org/I36243813"],"apc_list":null,"apc_paid":null,"fwci":1.227,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.849022,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"33","last_page":"42"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/learning-with-errors","display_name":"Learning with errors","score":0.7894322276115417},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6767553091049194},{"id":"https://openalex.org/keywords/gaussian","display_name":"Gaussian","score":0.6143975853919983},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5550452470779419},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5071918964385986},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5035991072654724},{"id":"https://openalex.org/keywords/gaussian-noise","display_name":"Gaussian noise","score":0.47085851430892944},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.429411381483078},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4223238527774811},{"id":"https://openalex.org/keywords/lattice","display_name":"Lattice (music)","score":0.4138581156730652},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.38115841150283813},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17457690834999084}],"concepts":[{"id":"https://openalex.org/C2779014939","wikidata":"https://www.wikidata.org/wiki/Q6510239","display_name":"Learning with errors","level":3,"score":0.7894322276115417},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6767553091049194},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.6143975853919983},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5550452470779419},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5071918964385986},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5035991072654724},{"id":"https://openalex.org/C4199805","wikidata":"https://www.wikidata.org/wiki/Q2725903","display_name":"Gaussian noise","level":2,"score":0.47085851430892944},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.429411381483078},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4223238527774811},{"id":"https://openalex.org/C2781204021","wikidata":"https://www.wikidata.org/wiki/Q6497091","display_name":"Lattice (music)","level":2,"score":0.4138581156730652},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.38115841150283813},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17457690834999084},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2600694.2600695","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2600694.2600695","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd ACM workshop on ASIA public-key cryptography","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W39036742","https://openalex.org/W121367636","https://openalex.org/W150064776","https://openalex.org/W1494049356","https://openalex.org/W1499766499","https://openalex.org/W1561126242","https://openalex.org/W1564449568","https://openalex.org/W1603256047","https://openalex.org/W1992282993","https://openalex.org/W1994790157","https://openalex.org/W2007466965","https://openalex.org/W2038619601","https://openalex.org/W2038761522","https://openalex.org/W2058785578","https://openalex.org/W2098290658","https://openalex.org/W2106970188","https://openalex.org/W2113333997","https://openalex.org/W2134101189","https://openalex.org/W2140256428","https://openalex.org/W2159044902","https://openalex.org/W2164761415","https://openalex.org/W2400070855","https://openalex.org/W2401911665","https://openalex.org/W2561675875","https://openalex.org/W2911646439","https://openalex.org/W6636076032"],"related_works":["https://openalex.org/W4214920459","https://openalex.org/W4300994926","https://openalex.org/W4312061170","https://openalex.org/W2953258282","https://openalex.org/W3049177476","https://openalex.org/W4300113538","https://openalex.org/W2935786241","https://openalex.org/W3047472941","https://openalex.org/W1970319972","https://openalex.org/W2953254336"],"abstract_inverted_index":{"In":[0],"this":[1],"paper":[2],"we":[3,104,113],"propose":[4,109],"the":[5,15,39,54,69,77,83,91,99,123,135,143,147],"first":[6],"provably":[7],"secure":[8],"public":[9],"key":[10],"encryption":[11,127],"scheme":[12,70,81,103,116],"based":[13,89],"on":[14,90,117],"Learning":[16],"with":[17,129],"Errors":[18],"(LWE)":[19],"problem,":[20],"in":[21,74],"which":[22],"secrets":[23],"and":[24,108],"errors":[25],"are":[26],"sampled":[27],"uniformly":[28],"at":[29],"random":[30],"from":[31,38],"a":[32,46,51,60],"relatively":[33],"small":[34],"set":[35],"rather":[36],"than":[37],"commonly":[40],"used":[41],"discrete":[42],"Gaussian":[43,130],"distribution.":[44],"Using":[45],"uniform":[47],"distribution,":[48],"instead":[49],"of":[50,56,87,93,101,122,146],"Gaussian,":[52],"has":[53],"potential":[55],"improving":[57],"computational":[58],"efficiency":[59,137],"great":[61],"deal":[62],"due":[63,141],"to":[64,120,142],"its":[65,106],"simplicity,":[66],"thus":[67],"making":[68],"attractive":[71],"for":[72],"use":[73],"practice.":[75],"At":[76],"same":[78],"time":[79],"our":[80,102,115],"features":[82],"strong":[84],"security":[85,107],"guarantee":[86],"being":[88],"hardness":[92],"worst-case":[94],"lattice":[95],"problems.":[96],"After":[97],"presenting":[98],"construction":[100],"prove":[105],"asymptotic":[110],"parameters.":[111],"Finally,":[112],"compare":[114],"several":[118],"measures":[119],"one":[121],"most":[124],"efficient":[125],"LWE-based":[126],"schemes":[128],"noise.":[131],"We":[132],"show":[133],"that":[134],"expected":[136],"improvement":[138],"is":[139],"debunked,":[140],"large":[144],"blow-up":[145],"parameter":[148],"sets":[149],"involved.":[150]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
