Results 41 to 50 of about 2,659 (196)

On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL [PDF]

open access: yes, 2017
We present novel variants of the dual-lattice attack against LWE in the presence of an unusually short secret. These variants are informed by recent progress in BKW-style algorithms for solving LWE.
Albrecht, Martin
core   +5 more sources

Efficient Batch Fully Homomorphic Encryption with a Shorter Key from Ring-LWE

open access: yesApplied Sciences, 2022
Fully homomorphic encryption allows users to use the computing resources of cloud servers for the computation of encrypted data without worrying about data leakage.
Yuyue Chen, Ruwei Huang, Bo Yang
doaj   +1 more source

Efficient Fully homomorphic encryption scheme using Ring-LWE [PDF]

open access: yesJournal of Physics: Conference Series, 2021
Abstract Data can be stored and processed in an encrypted format using fully homomorphic encryption, which makes cloud computing provider can process data well without even knowing data information. However, most existing homomorphic encryption schemes based on ring learning with errors, focus on the special classes of rings, such as ...
Dan Xin   +4 more
openaire   +1 more source

Analysis of Error Dependencies on Newhope

open access: yesIEEE Access, 2020
Among many submissions to NIST post-quantum cryptography (PQC) project, NewHope is a promising key encapsulation mechanism (KEM) based on the Ring-Learning with errors (Ring-LWE) problem.
Minki Song   +5 more
doaj   +1 more source

Consortium Blockchain Data Sharing Scheme Using Lattice Ciphertext Policy Attribute-Based Encryption [PDF]

open access: yesJisuanji gongcheng, 2023
In the process of data sharing, problems of data leakage and trust crisis can arise, and with the emergence of quantum computers, the threat to traditional encryption algorithms is greater.
Lingyun ZHANG, Yuling CHEN
doaj   +1 more source

Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
Public key cryptography protocols, such as RSA and elliptic curve cryptography, will be rendered insecure by Shor’s algorithm when large-scale quantum computers are built.
Utsav Banerjee   +2 more
doaj   +1 more source

FPGA-Based Hardware Accelerator for Leveled Ring-LWE Fully Homomorphic Encryption

open access: yesIEEE Access, 2020
Fully homomorphic encryption (FHE) allows arbitrary computation on encrypted data and has great potential in privacy-preserving cloud computing and securely outsource computational tasks.
Yang Su   +3 more
doaj   +1 more source

A lightweight McEliece cryptosystem co-processor design [PDF]

open access: yes, 2020
Due to the rapid advances in the development of quantum computers and their susceptibility to errors, there is a renewed interest in error correction algorithms.
Agrawal, Rashmi   +3 more
core   +2 more sources

Post-quantum cryptographic hardware primitives [PDF]

open access: yes, 2020
The development and implementation of post-quantum cryptosystems have become a pressing issue in the design of secure computing systems, as general quantum computers have become more feasible in the last two years.
Agrawal, Rashmi   +3 more
core  

A Subfield Lattice Attack on Overstretched NTRU Assumptions:Cryptanalysis of Some FHE and Graded Encoding Schemes [PDF]

open access: yes, 2016
International ...
A Ferraguti   +37 more
core   +5 more sources

Home - About - Disclaimer - Privacy