Results 101 to 110 of about 2,659 (196)
The Potential for Machine Learning Analysis over Encrypted Data in Cloud-based Clinical Decision Support - Background and Review [PDF]
This paper appeared at the 8th Australasian Workshop on Health Informatics and Knowledge Management (HIKM 2015), Sydney, Australia, January 2015. Conferences in Research and Practice in Information Technology (CRPIT), Vol.
Basilakis, J, Javadi, B, Maeder, Anthony
core
On the Ring-LWE and Polynomial-LWE Problems
The Ring Learning With Errors problem (\(\mathsf {RLWE}\)) comes in various forms. Vanilla \(\mathsf {RLWE}\) is the decision dual-\(\mathsf {RLWE}\) variant, consisting in distinguishing from uniform a distribution depending on a secret belonging to the dual \(\mathcal {O}_K^{\vee }\) of the ring of integers \(\mathcal {O}_K\) of a specified number ...
Roșca, Miruna +2 more
openaire +3 more sources
RLWE-based ciphertext-policy attribute proxy re-encryption
To solve LWE-based proxy re-encryption schemes cannot achieve fine-grained access and low efficiency problem,a ciphertext-policy attribute-based proxy re-encryption scheme was proposed.The scheme based on linear secret sharing scheme,RLWE and attribute ...
En ZHANG, Yaoyao PEI, Jiao DU
doaj +2 more sources
Dynamic Multi-Key Block Binary Ring-Compact Bootstrapping
Multi-Key Fully Homomorphic Encryption (MK-FHE) is essential for secure multi-party computation but currently faces significant scalability bottlenecks due to linear computational growth and low bootstrapping throughput.
Qiwei Xiao, Ruwei Huang
doaj +1 more source
Provably secure private-keyless encryption on ideal lattices
Private-keyless encryption (PKLE) addresses the cumbersome challenge of private key management by replacing traditional user private keys with one-time decryption credentials.
Hai LU, Shutong MENG, Yan ZHU, Yong LI
doaj +1 more source
Klepto for Ring-LWE Encryption [PDF]
Dianyan Xiao, Yang Yu
openaire +1 more source
Quantum Security of a Compact Multi-Signature
With the rapid advances in quantum computing, quantum security is now an indispensable property for any cryptographic system. In this paper, we study how to prove the security of a complex cryptographic system in the quantum random oracle model. We first
Shaoquan Jiang
doaj +1 more source
The rapid adoption of Internet of Medical Things (IoMT) devices enables real-time patient monitoring and remote diagnostics and has revolutionized healthcare delivery.
Zeyad Ghaleb Al-Mekhlaf +8 more
doaj +1 more source
In this paper, we have proposed a two-party authenticated key establishment (AKE), and authenticated key transport protocols based on lattice-based cryptography, aiming to provide security against quantum attacks for secure communication.
Mani Rajendran +3 more
doaj +1 more source
Ciphertext-policy attribute-based encryption (CP-ABE) is a cryptographic scheme suitable for secure data sharing on cloud storage. The CP-ABE based on lattice theory has the property of resisting quantum attack. Some data objects uploaded to the cloud by
Ting Guo +2 more
doaj +1 more source

