Zobrazeno 1 - 10
of 33
pro vyhledávání: '"Kamil Kluczniak"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 4 (2024)
In recent years, the research community has made great progress in improving techniques for privacy-preserving computation, such as fully homomorphic encryption (FHE). Despite the progress, there remain open challenges, mainly in performance and usab
Externí odkaz:
https://doaj.org/article/d54bd0146a734cc38a1411bbfc4be896
Autor:
Kamil Kluczniak, Leonard Schild
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 1 (2022)
Computation on ciphertexts of all known fully homomorphic encryption (FHE) schemes induces some noise, which, if too large, will destroy the plaintext. Therefore, the bootstrapping technique that re-encrypts a ciphertext and reduces the noise level r
Externí odkaz:
https://doaj.org/article/d1034e378f974f0d97470f95ce547440
Autor:
Kamil Kluczniak
Publikováno v:
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security.
Autor:
Kamil Kluczniak
Publikováno v:
Public-Key Cryptography – PKC 2022 ISBN: 9783030971304
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3dad69d3ea1e85a1f853697582db09d9
https://doi.org/10.1007/978-3-030-97131-1_3
https://doi.org/10.1007/978-3-030-97131-1_3
Autor:
Lucjan Hanzlik, Kamil Kluczniak
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783031182822
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4ad63573e4606cd1f15bd7a3b310f881
https://doi.org/10.1007/978-3-031-18283-9_4
https://doi.org/10.1007/978-3-031-18283-9_4
Publikováno v:
Fundamenta Informaticae. 169:295-330
Publikováno v:
Computers & Security. 79:53-67
The IoT era has led to a complex interplay between the communication security and the storage service providers. The secure key exchange is crucial from the perspective of communication confidentiality. Similarly, the evidence-based cryptography prov
Publikováno v:
International Journal of Information Security. 18:181-197
Recently, a few pragmatic and privacy protecting systems for authentication in multiple systems have been designed. The most prominent examples include Pseudonymous Signatures for German personal identity cards and Anonymous Attestation. The main pro
Publikováno v:
Advances in Cryptology – EUROCRYPT 2019 ISBN: 9783030176587
EUROCRYPT (3)
EUROCRYPT (3)
Ring signatures allow for creating signatures on behalf of an ad hoc group of signers, hiding the true identity of the signer among the group. A natural goal is to construct a ring signature scheme for which the signature size is short in the number
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::833ae3bf2c0d5bb98b0a0ea538d64afb
https://doi.org/10.1007/978-3-030-17659-4_10
https://doi.org/10.1007/978-3-030-17659-4_10
Autor:
Mirosław Kutyłowski, Kamil Kluczniak, Maciej Gebala, Marcin Słowik, Jakub Lemiesz, Marta Słowik
Publikováno v:
Information Security Practice and Experience ISBN: 9783030343385
ISPEC
ISPEC
Creating a distributed reputation system compliant with the GDPR Regulation faces a number of problems. Each record should be protected regarding its integrity and origin, while the record’s author should remain anonymous, as long as there is no ju
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8565a2691b8fb41a852497d34473af83
https://doi.org/10.1007/978-3-030-34339-2_19
https://doi.org/10.1007/978-3-030-34339-2_19