Results 51 to 60 of about 1,784 (149)
How to obtain a lattice basis from a discrete projected space [PDF]
International audienceEuclidean spaces of dimension n are characterized in discrete spaces by the choice of lattices. The goal of this paper is to provide a simple algorithm finding a lattice onto subspaces of lower dimensions onto which these discrete ...
A. Aldroubi +6 more
core +3 more sources
A Lattice-Based Group Authentication Scheme
Authentication has been adopted in many areas, but most of these authentication schemes are built using traditional cryptographic primitives. It is widely believed that such primitives are not resistant to quantum algorithms.
Jheng-Jia Huang +3 more
doaj +1 more source
URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme [PDF]
Design efficient lattice-based cryptosystem secure against adaptive chosen ciphertext attack (IND-CCA2) is a challenge problem. To the date, full CCA2-security of all proposed lattice-based PKE schemes achieved by using a generic transformations such as ...
Rastaghi, Roohallah
core
Bandwidth-optimized parallel private information retrieval [PDF]
We present improved and parallel versions of Lipmaa’s computationally-private information retrieval (CPIR) protocol based on a additively-homomorphic cryptosystem.
Savaş, Erkay, Ünal, Ecem
core +1 more source
EPN:encryption padding for NTRU with provable security
Known as the fastest public key cryptosystem available now,the provable security of NTRU has not been solved well.an encryption padding,called EPN was designed,for NTRU.Under the full domain one wayness assumption of NTRU,EPN had been proved ...
MU Ning-bo, HU Yu-pu, WANG Bao-cang
doaj +2 more sources
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM [PDF]
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of applications, in particular, as an essential building block for two-party and multi-party computation.
Barreto, Paulo S. L. M. +4 more
core +1 more source
Post-Quantum Cryptographic Frameworks for Internet of Things (IoT) and Internet of Medical Things (IoMT) Authentication Systems [PDF]
The rapid advancement of quantum computing threatens the security of classical cryptographic algorithms widely used in Internet of Things (IoT) and Internet of Medical Things (IoMT) systems.
Thomas L Barna +4 more
doaj +1 more source
Secret Sharing for Cloud Data Security
Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud ...
Attasena, Varunya +2 more
core +1 more source
Fast and Power-Analysis Resistant Ring Lizard Crypto-Processor Based on the Sparse Ternary Property
Ring Lizard (RLizard) is a quantum-resistant public-key cryptosystem based on the ideal lattice. RLizard uses a sparse ternary polynomial, which facilitates implementation with lower complexity.
Piljoo Choi, Ji-Hoon Kim, Dong Kyue Kim
doaj +1 more source
New NTRU Cryptosystem with Pauli Matrix
The NTRU public key cryptosystem was first presented by J. Hoffstein,J. H. Silverman and J. Pipher in 1996. This system is based on shortest and closest vector problem in a lattice and its operations are based on objects of a truncated polynomial ring.
null Priya Verma +2 more
openaire +1 more source

