Skip to main content

Table 1 Comparison of DRE Schemes from Lattices

From: (Identity-based) dual receiver encryption from lattice-based programmable hash functions with high min-entropy

 

# of

# of

# of

  

Other

Schemes

\(\mathbb {Z}_{q}^{n\times m}\) matrix

\(\mathbb {Z}_{q}^{m\times m}\) matrix

\(\mathbb {Z}_{q}^{m}\) vector

Assumption

Security

primitives

 

|pk|

|sk|

|c|

   

Geo13 (Georgescu 2013)

RLWE

IND-CCA

PKE, OTS

WWW’15 (Wang et al. 2015)

1

1

1

LWE

IND-CPA

 

Ours: DREABB

1

1

4

LWE

IND-CCA

OTS

  1. , |pk|,|sk| and |c| show the size of public key, secret key and ciphertext, respectively.
  2. , Because of the usage of an IND-CCA secure PKE scheme from lattices, we do not know how to show the detail of |pk|, |sk| and |c| about Geo’13 scheme