Results 91 to 100 of about 2,794 (176)

RLWE-based ciphertext-policy attribute proxy re-encryption

open access: yesTongxin xuebao, 2018
To solve LWE-based proxy re-encryption schemes cannot achieve fine-grained access and low efficiency problem,a ciphertext-policy attribute-based proxy re-encryption scheme was proposed.The scheme based on linear secret sharing scheme,RLWE and attribute ...
En ZHANG, Yaoyao PEI, Jiao DU
doaj   +2 more sources

Quantum Security of a Compact Multi-Signature

open access: yesCryptography
With the rapid advances in quantum computing, quantum security is now an indispensable property for any cryptographic system. In this paper, we study how to prove the security of a complex cryptographic system in the quantum random oracle model. We first
Shaoquan Jiang
doaj   +1 more source

Security Impact Analysis of Degree of Field Extension in Lattice Attacks on Ring-LWE Problem [PDF]

open access: green, 2023
Yuri Lucas Direbieski   +5 more
openalex   +1 more source

URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme [PDF]

open access: yes, 2013
Design efficient lattice-based cryptosystem secure against adaptive chosen ciphertext attack (IND-CCA2) is a challenge problem. To the date, full CCA2-security of all proposed lattice-based PKE schemes achieved by using a generic transformations such as ...
Rastaghi, Roohallah
core  

Efficient Hardware Arithmetic for Inverted Binary Ring-LWE Based Post-Quantum Cryptography [PDF]

open access: green, 2022
José Luis Imaña   +4 more
openalex   +1 more source

A quantum-resilient lattice-based security framework for internet of medical things in healthcare systems

open access: yesJournal of King Saud University: Computer and Information Sciences
The rapid adoption of Internet of Medical Things (IoMT) devices enables real-time patient monitoring and remote diagnostics and has revolutionized healthcare delivery.
Zeyad Ghaleb Al-Mekhlaf   +8 more
doaj   +1 more source

Security Analysis and Designing Advanced Two-Party Lattice-Based Authenticated Key Establishment and Key Transport Protocols for Mobile Communication

open access: yesFuture Internet
In this paper, we have proposed a two-party authenticated key establishment (AKE), and authenticated key transport protocols based on lattice-based cryptography, aiming to provide security against quantum attacks for secure communication.
Mani Rajendran   +3 more
doaj   +1 more source

Concrete analysis of approximate ideal-SIVP to decision ring-LWE reduction

open access: diamond, 2022
Neal Koblitz   +3 more
openalex   +1 more source

Lattice-Based CP-ABE Access Control for SDS Constraint with Lazy Assignment of Attributes and Attribute Revocation

open access: yesIET Information Security
Ciphertext-policy attribute-based encryption (CP-ABE) is a cryptographic scheme suitable for secure data sharing on cloud storage. The CP-ABE based on lattice theory has the property of resisting quantum attack. Some data objects uploaded to the cloud by
Ting Guo   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy