Results 1 to 10 of about 302 (149)

The Ring-LWE Problem in Lattice-Based Cryptography: The Case of Twisted Embeddings [PDF]

open access: yesEntropy, 2021
Several works have characterized weak instances of the Ring-LWE problem by exploring vulnerabilities arising from the use of algebraic structures. Although these weak instances are not addressed by worst-case hardness theorems, enabling other ring ...
Jheyne N. Ortiz   +4 more
doaj   +2 more sources

How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption [PDF]

open access: yesEntropy, 2021
There exists a natural trade-off in public key encryption (PKE) schemes based on ring learning with errors (RLWE), namely: we would like a wider error distribution to increase the security, but it comes at the cost of an increased decryption failure rate
Jiabo Wang, Cong Ling
doaj   +2 more sources

Fast Number Theoretic Transform for Ring-LWE on 8-bit AVR Embedded Processor [PDF]

open access: yesSensors, 2020
In this paper, we optimized Number Theoretic Transform (NTT) and random sampling operations on low-end 8-bit AVR microcontrollers. We focused on the optimized modular multiplication with secure countermeasure (i.e., constant timing), which ensures high ...
Hwajeong Seo   +6 more
doaj   +2 more sources

Towards a Ring Analogue of the Leftover Hash Lemma [PDF]

open access: yesJournal of Mathematical Cryptology, 2020
The leftover hash lemma (LHL) is used in the analysis of various lattice-based cryptosystems, such as the Regev and Dual-Regev encryption schemes as well as their leakage-resilient counterparts. The LHL does not hold in the ring setting, when the ring is
Dachman-Soled Dana   +3 more
doaj   +3 more sources

CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes [PDF]

open access: yesJournal of Mathematical Cryptology, 2020
This paper proposes a practical hybrid solution for combining and switching between three popular Ring-LWE-based FHE schemes: TFHE, B/FV and HEAAN. This is achieved by first mapping the different plaintext spaces to a common algebraic structure and then ...
Boura Christina   +3 more
doaj   +5 more sources

(In)Security of Ring-LWE Under Partial Key Exposure

open access: yesJournal of Mathematical Cryptology, 2020
We initiate the study of partial key exposure in Ring-LWE (RLWE)-based cryptosystems. Specifically, we (1) Introduce the search and decision Leaky R-LWE assumptions (Leaky R-SLWE, Leaky R-DLWE), to formalize the hardness of search/decision RLWE under ...
Dachman-Soled Dana   +3 more
doaj   +3 more sources

An MLWE-Based Cut-and-Choose Oblivious Transfer Protocol [PDF]

open access: yesEntropy
The existing lattice-based cut-and-choose oblivious transfer protocol is constructed based on the learning-with-errors (LWE) problem, which generally has the problem of inefficiency.
Yongli Tang   +5 more
doaj   +2 more sources

A novel framework for secure cryptocurrency transactions using quantum crypto guard [PDF]

open access: yesPeerJ Computer Science
In today’s digital world, cryptocurrencies like Bitcoin can secure transactions without banks. However, the rise of quantum computing poses significant threats to their security, as traditional cryptographic methods may be easily compromised. In addition,
Jamil Abedalrahim Jamil Alsayaydeh   +4 more
doaj   +3 more sources

A Post-Quantum Public-Key Signcryption Scheme over Scalar Integers Based on a Modified LWE Structure [PDF]

open access: yesSensors
To ensure confidentiality and integrity in the era of quantum computing, most post-quantum cryptographic schemes are designed to achieve either encryption or digital signature functionalities separately.
Mostefa Kara   +3 more
doaj   +2 more sources

Practical CCA2-Secure and Masked Ring-LWE Implementation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
During the last years public-key encryption schemes based on the hardness of ring-LWE have gained significant popularity. For real-world security applications assuming strong adversary models, a number of practical issues still need to be addressed.
Tobias Oder   +3 more
doaj   +4 more sources

Home - About - Disclaimer - Privacy