Results 1 to 10 of about 243,777 (279)

Revisiting Multivariate Ring Learning with Errors and Its Applications on Lattice-Based Cryptography [PDF]

open access: yesMathematics, 2021
The “Multivariate Ring Learning with Errors” problem was presented as a generalization of Ring Learning with Errors (RLWE), introducing efficiency improvements with respect to the RLWE counterpart thanks to its multivariate structure.
Alberto Pedrouzo-Ulloa   +4 more
doaj   +5 more sources

Inner product encryption from ring learning with errors [PDF]

open access: yesCybersecurity, 2020
The functional encryption scheme designed using the lattice can realize fine-grained encryption and it can resist quantum attacks. Unfortunately, the sizes of the keys and ciphertexts in cryptographic applications based on learning with errors are large,
Shisen Fang, Shaojun Yang, Yuexin Zhang
doaj   +2 more sources

Ring Learning With Errors: A crossroads between postquantum cryptography, machine learning and number theory [PDF]

open access: yesIrish Mathematical Society Bulletin, 2020
The present survey reports on the state of the art of the different cryptographic functionalities built upon the ring learning with errors problem and its interplay with several classical problems in algebraic number theory.
Chacón, Iván Blanco
core   +4 more sources

Using Ring Learning with Errors Problem to Construct Linkable Ring Signature Scheme

open access: yesJisuanji kexue yu tansuo, 2020
In order to solve the problem of large key size and low efficiency in the linkable ring signature scheme on lattice, this paper reconstructs the linkable ring signature scheme from lattice based on the ring learning with errors (RLWE) problem, according ...
YE Qing, WANG Wenbo, LI Yingying, QIN Panke, ZHAO Zongqu, WANG Yongjun
doaj   +2 more sources

Distributed Identity Authentication with Lenstra–Lenstra–Lovász Algorithm–Ciphertext Policy Attribute-Based Encryption from Lattices: An Efficient Approach Based on Ring Learning with Errors Problem [PDF]

open access: yesEntropy
In recent years, research on attribute-based encryption (ABE) has expanded into the quantum domain. Because a traditional single authority can cause the potential single point of failure, an improved lattice-based quantum-resistant identity ...
Qi Yuan   +6 more
doaj   +2 more sources

Vascular age estimation using a consumer wearable sleep tracker. [PDF]

open access: yesPLOS Digital Health
Vascular aging is traditionally assessed using a combination of clinical markers, blood pressure and arterial stiffness measurement. However, measuring vascular aging with reference equipment is costly and not scalable.
Gizem Yilmaz   +6 more
doaj   +2 more sources

Faster Homomorphic Trace-Type Function Evaluation

open access: yesIEEE Access, 2021
Homomorphic encryption enables computations over encrypted data without decryption, and can be used for outsourcing computations to some untrusted source.
Yu Ishimaki, Hayato Yamana
doaj   +1 more source

The polynomial learning with errors problem and the smearing condition

open access: yesJournal of Mathematical Cryptology, 2022
As quantum computing advances rapidly, guaranteeing the security of cryptographic protocols resistant to quantum attacks is paramount. Some leading candidate cryptosystems use the learning with errors (LWE) problem, attractive for its simplicity and ...
Babinkostova Liljana   +4 more
doaj   +1 more source

Privacy Aware Post Quantum Secure Ant Colony Optimization Ad Hoc On-Demand Distance Vector Routing in Intent Based Internet of Vehicles for 5G Smart Cities

open access: yesIEEE Access, 2023
The Internet of Vehicles (IoV), with advanced technology in 5G communication, is considered the backbone of a smart city’s intelligent transport system.
Tannu Sharma   +4 more
doaj   +1 more source

A New Constant-Size Group Signature Scheme From Lattices

open access: yesIEEE Access, 2020
A lattice-based group signature scheme (LGSS) is an active cryptographic primitive, where each group member can sign messages anonymously in the name of the entire group and each valid signature should be traced to some group member on the lattice.
Qin Luo, Chun-Yang Jiang
doaj   +1 more source

Home - About - Disclaimer - Privacy