Results 11 to 20 of about 357,414 (246)

On the Possibility of Classical Client Blind Quantum Computing

open access: yesCryptography, 2021
Classical client remote state preparation (CC − RSP) is a primitive where a fully classical party (client) can instruct the preparation of a sequence of random quantum states on some distant party (server) in a way that the description is known to the ...
Alexandru Cojocaru   +3 more
doaj   +1 more source

Revocable Cryptography from Learning with Errors

open access: yes, 2023
92 pages. Revised version.
Prabhanjan Ananth   +2 more
openaire   +2 more sources

Learning with Error

open access: yes, 2022
AbstractLearning with error was proposed by O. Regev in 2005 (see Regev, 2009), which can be regarded as a dual form of SIS problem. LWE has very important applications in modern cryptography, such as LWE-based fully homomorphic encryption. The main purpose of this chapter is to explain the mathematical principles of the LWE problem in detail ...
Zhiyong Zheng, Kun Tian, Fengxia Liu
openaire   +1 more source

New Constructions of Identity-Based Dual Receiver Encryption from Lattices

open access: yesEntropy, 2020
Dual receiver encryption (DRE), being originally conceived at CCS 2004 as a proof technique, enables a ciphertext to be decrypted to the same plaintext by two different but dual receivers and becomes popular recently due to itself useful application ...
Yuan Liu   +3 more
doaj   +1 more source

A Mathematical Perspective on Post-Quantum Cryptography

open access: yesMathematics, 2022
In 2016, the National Institute of Standards and Technology (NIST) announced an open competition with the goal of finding and standardizing suitable algorithms for quantum-resistant cryptography.
Maximilian Richter   +3 more
doaj   +1 more source

Learning with Physical Noise or Errors [PDF]

open access: yesIEEE Transactions on Dependable and Secure Computing, 2020
Hard learning problems have recently attracted significant attention within the cryptographic community, both as a versatile assumption on which to build various protocols, and as a potentially sound basis for lightweight (possibly side-channel and fault resistant) implementations.
Dina Kamel   +4 more
openaire   +3 more sources

Implementing RLWE-based Schemes Using an RSA Co-Processor

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
We repurpose existing RSA/ECC co-processors for (ideal) lattice-based cryptography by exploiting the availability of fast long integer multiplication.
Martin R. Albrecht   +5 more
doaj   +1 more source

Linear Regression With Distributed Learning: A Generalization Error Perspective [PDF]

open access: yesIEEE Transactions on Signal Processing, 2021
Distributed learning provides an attractive framework for scaling the learning task by sharing the computational load over multiple nodes in a network. Here, we investigate the performance of distributed learning for large-scale linear regression where the model parameters, i.e., the unknowns, are distributed over the network.
Martin Hellkvist   +2 more
openaire   +3 more sources

Delegation of Decryption Rights With Revocability From Learning With Errors

open access: yesIEEE Access, 2018
The notion of decryption rights delegation was initially introduced by Blaze et al. in EUROCRYPT 1998. It, defined as proxy re-encryption, allows a semi-trusted proxy to convert a ciphertext intended for a party to another ciphertext of the same ...
Wei Yin   +6 more
doaj   +1 more source

On Quantum Chosen-Ciphertext Attacks and Learning with Errors

open access: yesCryptography, 2020
Large-scale quantum computing poses a major threat to classical public-key cryptography. Recently, strong “quantum access” security models have shown that numerous symmetric-key cryptosystems are also vulnerable.
Gorjan Alagic   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy