Results 31 to 40 of about 116 (50)
Searchable encryption with randomized ciphertext and randomized keyword search
The notion of public-key encryption with keyword search (PEKS) was introduced to search over encrypted data without performing any decryption. In this article, we propose a PEKS scheme in which both the encrypted keyword and the trapdoor are randomized ...
Calderini Marco +3 more
doaj +1 more source
Cross-primitive comparison in CP-ABE
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a cornerstone technique for fine-grained access control in encrypted data sharing, with pairing-based schemes having established the de facto standard.
Gasparini Lorenzo +3 more
doaj +1 more source
Secret Sharing Schemes with a large number of players from Toric Varieties [PDF]
A general theory for constructing linear secret sharing schemes over a finite field $\Fq$ from toric varieties is introduced. The number of players can be as large as $(q-1)^r-1$ for $r\geq 1$.
Hansen, Johan P.
core
Smaller public keys for MinRank-based schemes
MinRank is an NP-complete problem in linear algebra whose characteristics make it attractive to build post-quantum cryptographic primitives. Several MinRank-based digital signature schemes have been proposed.
Di Scala Antonio J., Sanna Carlo
doaj +1 more source
Infinite Secret Sharing -- Examples [PDF]
The motivation for extending secret sharing schemes to cases when either the set of players is infinite or the domain from which the secret and/or the shares are drawn is infinite or both, is similar to the case when switching to abstract probability ...
Csirmaz, László, Dibert, Alexander
core +1 more source
Collision Times in Multicolor Urn Models and Sequential Graph Coloring With Applications to Discrete Logarithms [PDF]
Consider an urn model where at each step one of $q$ colors is sampled according to some probability distribution and a ball of that color is placed in an urn. The distribution of assigning balls to urns may depend on the color of the ball.
Bhattacharya, Bhaswar B.
core +2 more sources
Maps R:Z/nZ → Z/n^2Z and some cryptographic applications [PDF]
In his master thesis [8],the first author has studied the RSA signatures with several types of redundancy functions. In this paper, we shall introduce these redundancy functions and investigate arithmetic properties of these redundancy functions and the ...
1028 +8 more
core
Efficiency of SIDH-based signatures (yes, SIDH)
In this note, we assess the efficiency of a supersingular isogeny Diffie-Hellman (SIDH)-based digital signature built on a weaker variant of a recent identification protocol proposed by Basso et al.
Ghantous Wissam +2 more
doaj +1 more source
Using shifted conjugacy in braid-based cryptography
Conjugacy is not the only possible primitive for designing braid-based protocols. To illustrate this principle, we describe a Fiat--Shamir-style authentication protocol that be can be implemented using any binary operation that satisfies the left self ...
Dehornoy, Patrick
core +1 more source
Compartmented Threshold RSA Based on the Chinese Remainder Theorem [PDF]
In this paper we combine the compartmented secret sharing schemes based on the Chinese remainder theorem with the RSA scheme in order to obtain, as a novelty, a dedicated solution for compartmented threshold decryption or compartmented threshold digital ...
Manuela Grindei +2 more
core

