Results 1 to 10 of about 243,099 (282)

Inner product encryption from ring learning with errors [PDF]

open access: yesCybersecurity, 2020
The functional encryption scheme designed using the lattice can realize fine-grained encryption and it can resist quantum attacks. Unfortunately, the sizes of the keys and ciphertexts in cryptographic applications based on learning with errors are large,
Shisen Fang, Shaojun Yang, Yuexin Zhang
doaj   +2 more sources

Revisiting Multivariate Ring Learning with Errors and Its Applications on Lattice-Based Cryptography [PDF]

open access: yesMathematics, 2021
The “Multivariate Ring Learning with Errors” problem was presented as a generalization of Ring Learning with Errors (RLWE), introducing efficiency improvements with respect to the RLWE counterpart thanks to its multivariate structure.
Alberto Pedrouzo-Ulloa   +4 more
doaj   +3 more sources

Using Ring Learning with Errors Problem to Construct Linkable Ring Signature Scheme

open access: yesJisuanji kexue yu tansuo, 2020
In order to solve the problem of large key size and low efficiency in the linkable ring signature scheme on lattice, this paper reconstructs the linkable ring signature scheme from lattice based on the ring learning with errors (RLWE) problem, according ...
YE Qing, WANG Wenbo, LI Yingying, QIN Panke, ZHAO Zongqu, WANG Yongjun
doaj   +2 more sources

Distributed Identity Authentication with Lenstra–Lenstra–Lovász Algorithm–Ciphertext Policy Attribute-Based Encryption from Lattices: An Efficient Approach Based on Ring Learning with Errors Problem [PDF]

open access: yesEntropy
In recent years, research on attribute-based encryption (ABE) has expanded into the quantum domain. Because a traditional single authority can cause the potential single point of failure, an improved lattice-based quantum-resistant identity ...
Qi Yuan   +6 more
doaj   +2 more sources

CIDER: Cyber‐Security in Industrial IoT Using Deep Learning and Ring Learning with Errors

open access: yesIET Cyber-Physical Systems
Traditional security measures such as access control and authentication need to be more effective against ever‐evolving threats. Moreover, security concerns increase as more industries shift towards adopting the industrial Internet of things (IIoT ...
Siu Ting Tsoi, Anish Jindal
doaj   +2 more sources

Multiparty Homomorphic Encryption from Ring-Learning-with-Errors [PDF]

open access: yesProceedings on Privacy Enhancing Technologies, 2021
Abstract We propose and evaluate a secure-multiparty-computation (MPC) solution in the semi-honest model with dishonest majority that is based on multiparty homomorphic encryption (MHE). To support our solution, we introduce a multiparty version of the Brakerski-Fan-Vercauteren homomorphic cryptosystem and implement it in an open-source ...
Christian Mouchet   +3 more
openaire   +1 more source

Non-commutative Ring Learning with Errors from Cyclic Algebras

open access: yesJournal of Cryptology, 2022
AbstractThe Learning with Errors (LWE) problem is the fundamental backbone of modern lattice-based cryptography, allowing one to establish cryptography on the hardness of well-studied computational problems. However, schemes based on LWE are often impractical, so Ring LWE was introduced as a form of ‘structured’ LWE, trading off a hard to quantify loss
Grover, Charles   +3 more
openaire   +4 more sources

Faster Homomorphic Trace-Type Function Evaluation

open access: yesIEEE Access, 2021
Homomorphic encryption enables computations over encrypted data without decryption, and can be used for outsourcing computations to some untrusted source.
Yu Ishimaki, Hayato Yamana
doaj   +1 more source

Fast Vector Oblivious Linear Evaluation from Ring Learning with Errors [PDF]

open access: yesProceedings of the 9th on Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2021
Oblivious linear evaluation (OLE) is a fundamental building block in multi-party computation protocols. In OLE, a sender holds a description of an affine function $f_α,β (z)=α z+β$, the receiver holds an input x, and gets α x+β$ (where all computations are done over some field, or more generally, a ring). Vector OLE (VOLE) is a generalization where the
de Castro, Leo   +2 more
openaire   +1 more source

The polynomial learning with errors problem and the smearing condition

open access: yesJournal of Mathematical Cryptology, 2022
As quantum computing advances rapidly, guaranteeing the security of cryptographic protocols resistant to quantum attacks is paramount. Some leading candidate cryptosystems use the learning with errors (LWE) problem, attractive for its simplicity and ...
Babinkostova Liljana   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy