Results 101 to 110 of about 2,659 (196)

The Potential for Machine Learning Analysis over Encrypted Data in Cloud-based Clinical Decision Support - Background and Review [PDF]

open access: yes, 2015
This paper appeared at the 8th Australasian Workshop on Health Informatics and Knowledge Management (HIKM 2015), Sydney, Australia, January 2015. Conferences in Research and Practice in Information Technology (CRPIT), Vol.
Basilakis, J, Javadi, B, Maeder, Anthony
core  

On the Ring-LWE and Polynomial-LWE Problems

open access: yes, 2018
The Ring Learning With Errors problem (\(\mathsf {RLWE}\)) comes in various forms. Vanilla \(\mathsf {RLWE}\) is the decision dual-\(\mathsf {RLWE}\) variant, consisting in distinguishing from uniform a distribution depending on a secret belonging to the dual \(\mathcal {O}_K^{\vee }\) of the ring of integers \(\mathcal {O}_K\) of a specified number ...
Roșca, Miruna   +2 more
openaire   +3 more sources

RLWE-based ciphertext-policy attribute proxy re-encryption

open access: yesTongxin xuebao, 2018
To solve LWE-based proxy re-encryption schemes cannot achieve fine-grained access and low efficiency problem,a ciphertext-policy attribute-based proxy re-encryption scheme was proposed.The scheme based on linear secret sharing scheme,RLWE and attribute ...
En ZHANG, Yaoyao PEI, Jiao DU
doaj   +2 more sources

Dynamic Multi-Key Block Binary Ring-Compact Bootstrapping

open access: yesMathematics
Multi-Key Fully Homomorphic Encryption (MK-FHE) is essential for secure multi-party computation but currently faces significant scalability bottlenecks due to linear computational growth and low bootstrapping throughput.
Qiwei Xiao, Ruwei Huang
doaj   +1 more source

Provably secure private-keyless encryption on ideal lattices

open access: yes工程科学学报
Private-keyless encryption (PKLE) addresses the cumbersome challenge of private key management by replacing traditional user private keys with one-time decryption credentials.
Hai LU, Shutong MENG, Yan ZHU, Yong LI
doaj   +1 more source

Klepto for Ring-LWE Encryption [PDF]

open access: yesThe Computer Journal, 2018
Dianyan Xiao, Yang Yu
openaire   +1 more source

Quantum Security of a Compact Multi-Signature

open access: yesCryptography
With the rapid advances in quantum computing, quantum security is now an indispensable property for any cryptographic system. In this paper, we study how to prove the security of a complex cryptographic system in the quantum random oracle model. We first
Shaoquan Jiang
doaj   +1 more source

A quantum-resilient lattice-based security framework for internet of medical things in healthcare systems

open access: yesJournal of King Saud University: Computer and Information Sciences
The rapid adoption of Internet of Medical Things (IoMT) devices enables real-time patient monitoring and remote diagnostics and has revolutionized healthcare delivery.
Zeyad Ghaleb Al-Mekhlaf   +8 more
doaj   +1 more source

Security Analysis and Designing Advanced Two-Party Lattice-Based Authenticated Key Establishment and Key Transport Protocols for Mobile Communication

open access: yesFuture Internet
In this paper, we have proposed a two-party authenticated key establishment (AKE), and authenticated key transport protocols based on lattice-based cryptography, aiming to provide security against quantum attacks for secure communication.
Mani Rajendran   +3 more
doaj   +1 more source

Lattice-Based CP-ABE Access Control for SDS Constraint with Lazy Assignment of Attributes and Attribute Revocation

open access: yesIET Information Security
Ciphertext-policy attribute-based encryption (CP-ABE) is a cryptographic scheme suitable for secure data sharing on cloud storage. The CP-ABE based on lattice theory has the property of resisting quantum attack. Some data objects uploaded to the cloud by
Ting Guo   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy