Skip to main content

Table 1 Comparison of DRE Schemes from Lattices

From: (Identity-based) dual receiver encryption from lattice-based programmable hash functions with high min-entropy

  # of # of # of    Other
Schemes \(\mathbb {Z}_{q}^{n\times m}\) matrix \(\mathbb {Z}_{q}^{m\times m}\) matrix \(\mathbb {Z}_{q}^{m}\) vector Assumption Security primitives
  |pk| |sk| |c|    
Geo13 (Georgescu 2013) RLWE IND-CCA PKE, OTS
WWW’15 (Wang et al. 2015) 1 1 1 LWE IND-CPA  
Ours: DREABB 1 1 4 LWE IND-CCA OTS
  1. , |pk|,|sk| and |c| show the size of public key, secret key and ciphertext, respectively.
  2. , Because of the usage of an IND-CCA secure PKE scheme from lattices, we do not know how to show the detail of |pk|, |sk| and |c| about Geo’13 scheme