“…Multiple variants of LWE such as ring LWE [204], module LWE [188], cyclic LWE [150], continuous LWE [77], PRIM LWE [278], middle-product LWE [267], group LWE [127], entropic LWE [76], universal LWE [315], and polynomial-ring LWE [288] have been developed since 2010. Many cryptosystems rely on the hardness of LWE, including (identity-based, leakage-resilient, fully homomorphic, functional, publickey/key-encapsulation, updatable, attribute-based, inner product, predicate) encryption [28,176,306,265,138,12,204,6,74,143,96,44,59,60,61,71,120,63,199,200,49,212,53,275,125,264,171,145], oblivious transfer [247,70,260], (blind) signatures [138,202,268,203,20,…”