Results 241 to 250 of about 243,099 (282)
Some of the next articles are maybe not open access.

Cryptography with the Ring-LWE (Learning With Errors) Algorithm

Jurnal Teknik Indonesia
Ring-LWE (Ring Learning With Errors) is a post-quantum cryptography algorithm based on mathematical problems in number theory and algebra. It is an extension of LWE (Learning With Errors) first introduced by Oded Regev and is used for secure data encryption from quantum computer attacks.
null Hesty Sitohang   +5 more
openaire   +1 more source

Spectral distortion and the ring learning with errors problem

Involve, a Journal of Mathematics
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Babinkostova, Liljana   +4 more
openaire   +1 more source

Decentralized Ciphertext-Policy Attribute-Based Encryption from Learning with Errors over Rings

2016 IEEE Trustcom/BigDataSE/ISPA, 2016
We propose a Decentralized multi-authority Ciphertext-Policy Attribute-Based Encryption (DCP-ABE) scheme, where any party can become an authority by creating a public key and generating private keys for the users by utilizing their attributes. Any user can encrypt data in terms of any monotone access structure over attributes issued from any chosen set
Mohammad Shahriar Rahman   +2 more
openaire   +2 more sources

An Anti-Quantum Authentication Protocol for Space Information Networks Based on Ring Learning with Errors

Journal of Communications and Information Networks, 2021
With the continuous development of satellite communication and Internet of things technology, more and more devices can access space information networks (SIN) and enjoy satellite services everywhere in the world. However, due to the openness of the air-to-ground channel, the device will face a series of security threats when accessing SIN, such as ...
Junyan Guo   +3 more
openaire   +1 more source

Identity-Concealed Authenticated Encryption from Ring Learning with Errors

2019
Authenticated encryption (AE) is very suitable for a resources constrained environment for it needs less computational costs and AE has become one of the important technologies of modern communication security. Identity concealment is one of research focuses in design and analysis of current secure transport protocols (such as TLS1.3 and Google’s QUIC).
Chao Liu   +3 more
openaire   +1 more source

Learning with Errors over Rings

2010
The “learning with errors” (LWE) problem is to distinguish random linear equations, which have been perturbed by a small amount of noise, from truly uniform ones. The problem has been shown to be as hard as worst-case lattice problems, and in recent years it has served as the foundation for a plethora of cryptographic applications.
openaire   +1 more source

Ring Signatures Based on Middle-Product Learning with Errors Problems

2019
Lattice-based (linkable) ring signatures are an important notion to cryptography since it protects signer anonymity against quantum computers. In this paper, we proposed a new lattice-based linkable ring signature scheme using a variant of Learning with Errors problem called Middle-Product Learning with Errors (\(\mathsf {MPLWE}\)). The proposed scheme
Dipayan Das, Man Ho Au, Zhenfei Zhang
openaire   +1 more source

A Signcryption Scheme Based Learning with Errors over Rings Without Trapdoor

2019
Signcryption has been extensively studied based on bilinear pairings, but rarely on lattices. This paper constructed a new lattice-based signcryption scheme in the random oracle model by skillfully combining a learning with errors over ring (R-LWE) based signature scheme (using the Fiat-Shamir with aborts technique) and a R-LWE based key exchange ...
Zhen Liu, Yi-Liang Han, Xiao-Yuan Yang
openaire   +1 more source

Faster Number Theoretic Transform on Graphics Processors for Ring Learning with Errors Based Cryptography

2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), 2018
The Number Theoretic Transform (NTT) has been revived recently by the advent of the Ring-Learning with Errors (Ring-LWE) Homomorphic Encryption (HE) schemes. In these schemes, the NTT is used to calculate the product of high degree polynomials with multi-precision coefficients in quasilinear time.
Ahmad Al Badawi   +2 more
openaire   +1 more source

Ring Learning With Errors: A crossroads between postquantum cryptography, machine learning and number theory

2019
arXiv admin note: text overlap with arXiv:1508.01375 by other authors/ comment of the author: quotation has been added to Theorem 5 ...
openaire   +1 more source

Home - About - Disclaimer - Privacy