Results 31 to 40 of about 2,293 (163)

Cloud Computing in the Quantum Era [PDF]

open access: yes, 2019
Cloud computing has become the prominent technology of this era. Its elasticity, dynamicity, availability, heterogeneity, and pay as you go pricing model has attracted several companies to migrate their businesses' services into the cloud.
Kaiiali, Mustafa   +2 more
core   +2 more sources

Distribution of Inverses in Polynomial Rings [PDF]

open access: yes, 2001
NOTICE: this is the author's version of a work that was accepted for publication in Indagationes Mathematicae. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control ...
Banks, William David, 1964-   +1 more
core   +1 more source

Depth optimized efficient homomorphic sorting [PDF]

open access: yes, 2015
We introduce a sorting scheme which is capable of efficiently sorting encrypted data without the secret key. The technique is obtained by focusing on the multiplicative depth of the sorting circuit alongside the more traditional metrics such as number of
A Chatterjee   +8 more
core   +1 more source

A Survey on Homomorphic Encryption Schemes: Theory and Implementation

open access: yes, 2017
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Acar, Abbas   +3 more
core   +1 more source

Solving the Shortest Vector Problem in Lattices Faster Using Quantum Search [PDF]

open access: yes, 2013
By applying Grover's quantum search algorithm to the lattice algorithms of Micciancio and Voulgaris, Nguyen and Vidick, Wang et al., and Pujol and Stehl\'{e}, we obtain improved asymptotic quantum results for solving the shortest vector problem.
A. Ambainis   +39 more
core   +2 more sources

An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices [PDF]

open access: yes, 2015
In this paper, we study the Learning With Errors problem and its binary variant, where secrets and errors are binary or taken in a small interval. We introduce a new variant of the Blum, Kalai and Wasserman algorithm, relying on a quantization step that ...
A Blum   +27 more
core   +2 more sources

A Non-commutative Cryptosystem Based on Quaternion Algebras

open access: yes, 2017
We propose BQTRU, a non-commutative NTRU-like cryptosystem over quaternion algebras. This cryptosystem uses bivariate polynomials as the underling ring.
Bagheri, Khadijeh   +2 more
core   +1 more source

A general construction for monoid-based knapsack protocols [PDF]

open access: yes, 2014
We present a generalized version of the knapsack protocol proposed by D. Naccache and J. Stern at the Proceedings of Eurocrypt (1997). Our new framework will allow the construction of other knapsack protocols having similar security features.
Micheli, Giacomo, Schiavina, Michele
core   +1 more source

Secret Sharing for Cloud Data Security

open access: yes, 2017
Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud ...
Attasena, Varunya   +2 more
core   +1 more source

An identification scheme based on sparse polynomials [PDF]

open access: yes, 2000
This is a preprint of a book chapter published in Lecture Notes in Computer Science,1751, Springer-Verlag, Berlin (2000). The original publication is available at www.springerlink.com.This paper gives a new example of exploiting the idea of using ...
Banks, William David, 1964-   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy