Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme

7Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We show how to build distributed key generation and distributed decryption procedures for the Ring-LWE based post-quantum cryptosystem. Our protocols implement the CCA variants of distributed decryption and are actively secure (with abort) in the case of three parties and honest majority. Our protocols make use of a combination of problem specific MPC protocols, generic garbled circuit based MPC and generic Linear Secret Sharing based MPC. We also, as a by-product, report on the first run-times for the execution of the SHA-3 function in an MPC system.

Cite

CITATION STYLE

APA

Kraitsberg, M., Lindell, Y., Osheter, V., Smart, N. P., & Talibi Alaoui, Y. (2019). Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11547 LNCS, pp. 192–210). Springer Verlag. https://doi.org/10.1007/978-3-030-21548-4_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free