Results 41 to 50 of about 4,957 (182)

An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices [PDF]

open access: yes, 2015
In this paper, we study the Learning With Errors problem and its binary variant, where secrets and errors are binary or taken in a small interval. We introduce a new variant of the Blum, Kalai and Wasserman algorithm, relying on a quantization step that ...
A Blum   +27 more
core   +2 more sources

Solving the Shortest Vector Problem in Lattices Faster Using Quantum Search [PDF]

open access: yes, 2013
By applying Grover's quantum search algorithm to the lattice algorithms of Micciancio and Voulgaris, Nguyen and Vidick, Wang et al., and Pujol and Stehl\'{e}, we obtain improved asymptotic quantum results for solving the shortest vector problem.
A. Ambainis   +39 more
core   +2 more sources

An NTRU-like Message Recoverable Signature Algorithm

open access: yesMathematics
An important feature of Nyberg-Rueppel type digital signature algorithms is message recovery, this signature algorithm can recover the original information from the signature directly by the verifier in the verification phase after signing the message ...
Tingle Shen, Li Miao, Bin Hua, Shuai Li
doaj   +1 more source

Depth optimized efficient homomorphic sorting [PDF]

open access: yes, 2015
We introduce a sorting scheme which is capable of efficiently sorting encrypted data without the secret key. The technique is obtained by focusing on the multiplicative depth of the sorting circuit alongside the more traditional metrics such as number of
A Chatterjee   +8 more
core   +1 more source

Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application

open access: yesTongxin xuebao, 2021
To improve the practicability of homomorphic encryption in the application of multi-user cloud computing, a NTRU-based multi-key homomorphic proxy re-encryption (MKH-PRE) scheme was constructed.Firstly, a new form of NTRU-based multi-key ciphertext was ...
Ruiqi LI, Chunfu JIA, Yafei WANG
doaj   +2 more sources

Accelerating NTRU Encryption with Graphics Processing Units [PDF]

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2014
Lattice based cryptography is attractive for its quantum computing resistance and efficient encryption/ decryption process. However, the Big Data issue has perplexed most lattice based cryptographic systems since the overall processing is slowed down too
Tianyu Bai   +4 more
doaj   +1 more source

Rights or containment? The politics of Aboriginal cultural heritage in Victoria [PDF]

open access: yes, 2006
Aboriginal cultural heritage protection, and the legislative regimes that underpin it, constitute important mechanisms for Aboriginal people to assert their rights and responsibilities.
Porter, E.
core   +1 more source

BAT: Small and Fast KEM over NTRU Lattices

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
We present BAT – an IND-CCA secure key encapsulation mechanism (KEM) that is based on NTRU but follows an encryption/decryption paradigm distinct from classical NTRU KEMs.
Pierre-Alain Fouque   +3 more
doaj   +1 more source

NTRU Lattice–Based Blockchain Consensus–Assisted Vehicle‐to‐Vehicle Authenticated Message Delivery in Internet of Vehicles

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 8, 25 May 2025.
Overview of blockchain supported multisignature algorithm for IoV. ABSTRACT The Internet of Vehicles (IoV) has emerged as a promising application capable of enhancing transportation efficiency and providing a variety of mobile services to drivers. This IoV enables real‐time data sharing among vehicles and infrastructure, allowing for better traffic ...
Dushyant Kumar Yadav   +3 more
wiley   +1 more source

A Privacy‐Preserving System for Confidential Carpooling Services Using Homomorphic Encryption

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 5, May 2025.
This research presents a homomorphic encryption‐based solution to enhance privacy in carpooling without compromising functionality. Rigorous experiments confirm its robustness, accuracy, and efficiency in securely matching users while preserving confidentiality.
David Palma   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy