Results 1 to 10 of about 16,532 (241)

A failure in decryption process for bivariate polynomial reconstruction problem cryptosystem

open access: yesHeliyon
In 1999, the Polynomial Reconstruction Problem (PRP) was put forward as a new hard mathematics problem. A univariate PRP scheme by Augot and Finiasz was introduced at Eurocrypt in 2003, and this cryptosystem was fully cryptanalyzed in 2004.
Siti Nabilah Yusof   +6 more
doaj   +4 more sources

Enhancing security in instant messaging systems with a hybrid SM2, SM3, and SM4 encryption framework. [PDF]

open access: yesPLoS ONE
With the rapid integration of instant messaging systems (IMS) into critical domains such as finance, public services, and enterprise operations, ensuring the confidentiality, integrity, and availability of communication data has become a pressing concern.
He-Jun Lu   +2 more
doaj   +2 more sources

On Accuracy of Testing Decryption Failure Rate for Encryption Schemes under the LWE Assumption

open access: yesIET Information Security
Lattice-based encryption schemes are significant cryptographic primitives to defend information security against quantum menace, and the decryption failure rate is related to both theoretical and realistic security.
Lin Wang, Yang Wang, Huiwen Jia
doaj   +2 more sources

Efficient methods to overcome Rabin cryptosystem decryption failure [PDF]

open access: yes, 2017
Rabin cryptosystem is an efficient factoring-based scheme, however, its decryption produces 4-to-1 output, which leads to decryption failure. In this work, in order to overcome the 4-to-1 decryption problem for the Rabin cryptosystem, we propose two ...
Asbullah, Muhammad Asyraf   +2 more
core   +2 more sources

A Blockchain-Enabled Multi-Authority Secure IoT Data-Sharing Scheme with Attribute-Based Searchable Encryption for Intelligent Systems [PDF]

open access: yesSensors
With the advancement of technologies such as 5G, digital twins, and edge computing, the Internet of Things (IoT) as a critical component of intelligent systems is profoundly driving the transformation of various industries toward digitalization and ...
Fu Zhang   +4 more
doaj   +2 more sources

Distributed Attribute-Based Encryption Scheme Based on Fog Nodes [PDF]

open access: yesJisuanji gongcheng, 2021
The existing cloud storage schemes have multiple limitations, including the general division of user rights to access data, fine-grained control access permissions, and single point of failure in single authority.This paper proposes a distributed ...
MA Jiajia, ZHANG Zhiqiang, CAO Suzhen, DOU Fengge, DING Xiaohui, WANG Caifen
doaj   +1 more source

HybridPKE: A forward-secure non-interactive quantum-safe hybrid key exchange scheme

open access: yesEngineering Science and Technology, an International Journal, 2022
The schemes submitted to NIST call for standardization of post-quantum cryptography have some common drawbacks in terms of decryption failure probability, scalability, and switching issues from pre-quantum to post- quantum cryptography. In this paper, we
Simran Choudhary, Anil Gupta
doaj   +1 more source

Analysis on Aigis‐Enc: Asymmetrical and symmetrical

open access: yesIET Information Security, 2021
Aigis‐Enc is an encryption algorithm based on asymmetrical learning with errors (LWE). A thorough comparison between Aigis‐Enc (with the recommended parameters) and a symmetrical LWE encryption scheme on the same scale (the sampling parameters are {η1 ...
Yupu Hu, Siyue Dong, Xingting Dong
doaj   +1 more source

CQTRU: A Commutative Quaternions Rings Based Public Key Cryptosystem [PDF]

open access: yesEngineering and Technology Journal, 2016
In this paper, we propose a new version of the NTRU public key cryptosystem called CQTRU. It is a four-dimensional cryptosystem based on the commutative quaternion ring.
Nadia M.G. Alsaidi   +2 more
doaj   +1 more source

Polar Codes for Module-LWE Public Key Encryption: The Case of Kyber

open access: yesCryptography, 2023
In modern society, the Internet is one of the most used means of communication. Thus, secure information transfer is inevitably of major importance.
Iason Papadopoulos, Jiabo Wang
doaj   +1 more source

Home - About - Disclaimer - Privacy