Results 91 to 100 of about 2,794 (176)
Recovering the Secret on Binary Ring-LWE problem with Random Known bits
Reynaldo Caceres Villena, Routo Terada
openalex +2 more sources
RLWE-based ciphertext-policy attribute proxy re-encryption
To solve LWE-based proxy re-encryption schemes cannot achieve fine-grained access and low efficiency problem,a ciphertext-policy attribute-based proxy re-encryption scheme was proposed.The scheme based on linear secret sharing scheme,RLWE and attribute ...
En ZHANG, Yaoyao PEI, Jiao DU
doaj +2 more sources
Quantum Security of a Compact Multi-Signature
With the rapid advances in quantum computing, quantum security is now an indispensable property for any cryptographic system. In this paper, we study how to prove the security of a complex cryptographic system in the quantum random oracle model. We first
Shaoquan Jiang
doaj +1 more source
Security Impact Analysis of Degree of Field Extension in Lattice Attacks on Ring-LWE Problem [PDF]
Yuri Lucas Direbieski +5 more
openalex +1 more source
URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme [PDF]
Design efficient lattice-based cryptosystem secure against adaptive chosen ciphertext attack (IND-CCA2) is a challenge problem. To the date, full CCA2-security of all proposed lattice-based PKE schemes achieved by using a generic transformations such as ...
Rastaghi, Roohallah
core
Efficient Hardware Arithmetic for Inverted Binary Ring-LWE Based Post-Quantum Cryptography [PDF]
José Luis Imaña +4 more
openalex +1 more source
The rapid adoption of Internet of Medical Things (IoMT) devices enables real-time patient monitoring and remote diagnostics and has revolutionized healthcare delivery.
Zeyad Ghaleb Al-Mekhlaf +8 more
doaj +1 more source
In this paper, we have proposed a two-party authenticated key establishment (AKE), and authenticated key transport protocols based on lattice-based cryptography, aiming to provide security against quantum attacks for secure communication.
Mani Rajendran +3 more
doaj +1 more source
Concrete analysis of approximate ideal-SIVP to decision ring-LWE reduction
Neal Koblitz +3 more
openalex +1 more source
Ciphertext-policy attribute-based encryption (CP-ABE) is a cryptographic scheme suitable for secure data sharing on cloud storage. The CP-ABE based on lattice theory has the property of resisting quantum attack. Some data objects uploaded to the cloud by
Ting Guo +2 more
doaj +1 more source

