Results 31 to 40 of about 4,957 (182)

Accelerating LTV based homomorphic encryption in reconfigurable hardware [PDF]

open access: yes, 2015
After being introduced in 2009, the first fully homomorphic encryption (FHE) scheme has created significant excitement in academia and industry. Despite rapid advances in the last 6 years, FHE schemes are still not ready for deployment due to an ...
Doroz, Yarkin   +6 more
core   +1 more source

Efficient multi‐key fully homomorphic encryption over prime cyclotomic rings with fewer relinearisations

open access: yesIET Information Security, 2021
Multi‐key fully homomorphic encryption (MKFHE) allows computations on ciphertexts encrypted by different users, which can be applied to implement secure multi‐party computing (MPC).
TanPing Zhou   +5 more
doaj   +1 more source

A Blind Digital Signature Protocol over NTRU [PDF]

open access: yesE3S Web of Conferences, 2022
Actually, the NIST post-quantum cryptosystem standardization competition reached its third round with seven finalist candidates. And NIST invites the cryptographic community to analyzing the selected candidates. In this context, we contribute by creating
Laaji El Hassane, Azizi Abdelmalek
doaj   +1 more source

Distribution of Inverses in Polynomial Rings [PDF]

open access: yes, 2001
NOTICE: this is the author's version of a work that was accepted for publication in Indagationes Mathematicae. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control ...
Banks, William David, 1964-   +1 more
core   +1 more source

On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL [PDF]

open access: yes, 2017
We present novel variants of the dual-lattice attack against LWE in the presence of an unusually short secret. These variants are informed by recent progress in BKW-style algorithms for solving LWE.
Albrecht, Martin
core   +4 more sources

A Non-commutative Cryptosystem Based on Quaternion Algebras

open access: yes, 2017
We propose BQTRU, a non-commutative NTRU-like cryptosystem over quaternion algebras. This cryptosystem uses bivariate polynomials as the underling ring.
Bagheri, Khadijeh   +2 more
core   +1 more source

Hagedorn divergences and tachyon potential [PDF]

open access: yes, 2007
We consider the critical behavior for a string theory near the Hagedorn temperature. We use the factorization of the worldsheet to isolate the Hagedorn divergences at all genera. We show that the Hagedorn divergences can be resummed by introducing double
A.A. Belavin   +27 more
core   +2 more sources

Study on the parameters of the matrix NTRU cryptosystem

open access: yes河南理工大学学报. 自然科学版
With the rapid development of quantum computers, post-quantum cryptography has emerged as a prominent area of research in cryptography.ObjectivesIn order to avoid the decryption failure in matrix NTRU as NTRU, the Matrix NTRU algorithm was optimized ...
LI Zichen   +3 more
doaj   +1 more source

Security Vulnerabilities of Four Signature Schemes From NTRU Lattices and Pairings

open access: yesIEEE Access, 2020
Certificateless cryptography solves the certificate management problem in public-key cryptography and the key-escrow problem in identity-based cryptography. Xie et al. proposed a certificateless signature scheme using NTRU lattices.
Kyung-Ah Shim
doaj   +1 more source

A Survey on Homomorphic Encryption Schemes: Theory and Implementation

open access: yes, 2017
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Acar, Abbas   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy