The Ring-LWE Problem in Lattice-Based Cryptography: The Case of Twisted Embeddings [PDF]
Several works have characterized weak instances of the Ring-LWE problem by exploring vulnerabilities arising from the use of algebraic structures. Although these weak instances are not addressed by worst-case hardness theorems, enabling other ring ...
Jheyne N. Ortiz +4 more
doaj +4 more sources
CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes [PDF]
This paper proposes a practical hybrid solution for combining and switching between three popular Ring-LWE-based FHE schemes: TFHE, B/FV and HEAAN. This is achieved by first mapping the different plaintext spaces to a common algebraic structure and then ...
Boura Christina +3 more
doaj +6 more sources
How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption [PDF]
There exists a natural trade-off in public key encryption (PKE) schemes based on ring learning with errors (RLWE), namely: we would like a wider error distribution to increase the security, but it comes at the cost of an increased decryption failure rate
Jiabo Wang, Cong Ling
doaj +2 more sources
Fast Number Theoretic Transform for Ring-LWE on 8-bit AVR Embedded Processor [PDF]
In this paper, we optimized Number Theoretic Transform (NTT) and random sampling operations on low-end 8-bit AVR microcontrollers. We focused on the optimized modular multiplication with secure countermeasure (i.e., constant timing), which ensures high ...
Hwajeong Seo +6 more
doaj +2 more sources
High-Secure Fingerprint Authentication System Using Ring-LWE Cryptography
This paper presents a high-secure fingerprint authentication system using ring learning with errors (ring-LWE) cryptography to protect users' fingerprint data more securely.
Tuy Nguyen Tan, Hanho Lee
doaj +3 more sources
An MLWE-Based Cut-and-Choose Oblivious Transfer Protocol [PDF]
The existing lattice-based cut-and-choose oblivious transfer protocol is constructed based on the learning-with-errors (LWE) problem, which generally has the problem of inefficiency.
Yongli Tang +5 more
doaj +2 more sources
A novel framework for secure cryptocurrency transactions using quantum crypto guard [PDF]
In today’s digital world, cryptocurrencies like Bitcoin can secure transactions without banks. However, the rise of quantum computing poses significant threats to their security, as traditional cryptographic methods may be easily compromised. In addition,
Jamil Abedalrahim Jamil Alsayaydeh +4 more
doaj +3 more sources
A Post-Quantum Public-Key Signcryption Scheme over Scalar Integers Based on a Modified LWE Structure [PDF]
To ensure confidentiality and integrity in the era of quantum computing, most post-quantum cryptographic schemes are designed to achieve either encryption or digital signature functionalities separately.
Mostefa Kara +3 more
doaj +2 more sources
Quantum-resilient and adaptive multi-region data aggregation for IoMT using zero-knowledge proofs and edge intelligence [PDF]
The Internet of Medical Things (IoMT) transforms healthcare by enabling real-time monitoring of patient vitals, such as heart rate and glucose levels, but faces significant challenges in securing sensitive data against cyber threats and ensuring ...
Soufiane Ben Othman, Gyanendra Kumar
doaj +2 more sources
A Blockchain Copyright Protection Scheme Based on CP-ABE Scheme with Policy Update [PDF]
Although the copyright protection schemes supported by blockchain have significantly changed traditional copyright data management, there are still some data security challenges that cannot be ignored, especially the secure access and controllable ...
Jian Jiang +3 more
doaj +2 more sources

