Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Jinhyuck Jeong"'
Publikováno v:
IEEE Access, Vol 8, Pp 191319-191329 (2020)
Threshold homomorphic encryption (Threshold HE) schemes are modified homomorphic encryption schemes to be suitable for privacy-preserving data integration and analysis. In actual usage of it, one should take it care into consideration who manages sec
Externí odkaz:
https://doaj.org/article/c356fec65d7345cdb9e5b10a8c33e940
Publikováno v:
IEEE Access, Vol 8, Pp 191319-191329 (2020)
Threshold homomorphic encryption (Threshold HE) schemes are modified homomorphic encryption schemes to be suitable for privacy-preserving data integration and analysis. In actual usage of it, one should take it care into consideration who manages sec
Publikováno v:
Future Generation Computer Systems. 95:100-103
In this note, we review the article published by Zhu et al. in Future Generation Computer Systems in 2017. We show that their construction of a blind signature does not hold the correctness requirement or the blindness requirement.
Publikováno v:
LMS Journal of Computation and Mathematics. 19:255-266
Let$\mathbf{f}$and$\mathbf{g}$be polynomials of a bounded Euclidean norm in the ring$\mathbb{Z}[X]/\langle X^{n}+1\rangle$. Given the polynomial$[\mathbf{f}/\mathbf{g}]_{q}\in \mathbb{Z}_{q}[X]/\langle X^{n}+1\rangle$, the NTRU problem is to find$\ma
Publikováno v:
Information Security and Privacy ISBN: 9783319936376
ACISP
ACISP
After the concept of a Fuzzy Extractor (FE) was first introduced by Dodis et al., it has been regarded as one of the candidate solutions for key management utilizing biometric data. With a noisy input such as biometrics, FE generates a public helper
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7768325d1e28128a3c4f2ac1b51b9f94
https://doi.org/10.1007/978-3-319-93638-3_3
https://doi.org/10.1007/978-3-319-93638-3_3
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783319702773
Financial Cryptography Workshops
Financial Cryptography Workshops
In 2014, Bos et al. introduced a cloud service scenario to provide private predictive analyses on encrypted medical data, and gave a proof of concept implementation by utilizing homomorphic encryption (HE) scheme. In their implementation, they needed
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b2d5b97c2056afab62173e06b0d67cab
https://doi.org/10.1007/978-3-319-70278-0_4
https://doi.org/10.1007/978-3-319-70278-0_4
Autor:
Jinhyuck Jeong, Taechan Kim
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783662543641
Public Key Cryptography (1)
Public Key Cryptography (1)
We propose a generalization of exTNFS algorithm recently introduced by Kim and Barbulescu (CRYPTO 2016). The algorithm, exTNFS, is a state-of-the-art algorithm for discrete logarithm in \(\mathbb {F}_{p^n}\) in the medium prime case, but it only appl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2cb22a29677b740678674349f783ccc2
https://doi.org/10.1007/978-3-662-54365-8_16
https://doi.org/10.1007/978-3-662-54365-8_16