Results 41 to 50 of about 4,957 (182)
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices [PDF]
In this paper, we study the Learning With Errors problem and its binary variant, where secrets and errors are binary or taken in a small interval. We introduce a new variant of the Blum, Kalai and Wasserman algorithm, relying on a quantization step that ...
A Blum +27 more
core +2 more sources
Solving the Shortest Vector Problem in Lattices Faster Using Quantum Search [PDF]
By applying Grover's quantum search algorithm to the lattice algorithms of Micciancio and Voulgaris, Nguyen and Vidick, Wang et al., and Pujol and Stehl\'{e}, we obtain improved asymptotic quantum results for solving the shortest vector problem.
A. Ambainis +39 more
core +2 more sources
An NTRU-like Message Recoverable Signature Algorithm
An important feature of Nyberg-Rueppel type digital signature algorithms is message recovery, this signature algorithm can recover the original information from the signature directly by the verifier in the verification phase after signing the message ...
Tingle Shen, Li Miao, Bin Hua, Shuai Li
doaj +1 more source
Depth optimized efficient homomorphic sorting [PDF]
We introduce a sorting scheme which is capable of efficiently sorting encrypted data without the secret key. The technique is obtained by focusing on the multiplicative depth of the sorting circuit alongside the more traditional metrics such as number of
A Chatterjee +8 more
core +1 more source
Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application
To improve the practicability of homomorphic encryption in the application of multi-user cloud computing, a NTRU-based multi-key homomorphic proxy re-encryption (MKH-PRE) scheme was constructed.Firstly, a new form of NTRU-based multi-key ciphertext was ...
Ruiqi LI, Chunfu JIA, Yafei WANG
doaj +2 more sources
Accelerating NTRU Encryption with Graphics Processing Units [PDF]
Lattice based cryptography is attractive for its quantum computing resistance and efficient encryption/ decryption process. However, the Big Data issue has perplexed most lattice based cryptographic systems since the overall processing is slowed down too
Tianyu Bai +4 more
doaj +1 more source
Rights or containment? The politics of Aboriginal cultural heritage in Victoria [PDF]
Aboriginal cultural heritage protection, and the legislative regimes that underpin it, constitute important mechanisms for Aboriginal people to assert their rights and responsibilities.
Porter, E.
core +1 more source
BAT: Small and Fast KEM over NTRU Lattices
We present BAT – an IND-CCA secure key encapsulation mechanism (KEM) that is based on NTRU but follows an encryption/decryption paradigm distinct from classical NTRU KEMs.
Pierre-Alain Fouque +3 more
doaj +1 more source
Overview of blockchain supported multisignature algorithm for IoV. ABSTRACT The Internet of Vehicles (IoV) has emerged as a promising application capable of enhancing transportation efficiency and providing a variety of mobile services to drivers. This IoV enables real‐time data sharing among vehicles and infrastructure, allowing for better traffic ...
Dushyant Kumar Yadav +3 more
wiley +1 more source
A Privacy‐Preserving System for Confidential Carpooling Services Using Homomorphic Encryption
This research presents a homomorphic encryption‐based solution to enhance privacy in carpooling without compromising functionality. Rigorous experiments confirm its robustness, accuracy, and efficiency in securely matching users while preserving confidentiality.
David Palma +3 more
wiley +1 more source

