Zobrazeno 1 - 10
of 2 014
pro vyhledávání: '"Learning with errors"'
Publikováno v:
Signals, Vol 5, Iss 2, Pp 216-243 (2024)
The swift advancement of quantum computing devices holds the potential to create robust machines that can tackle an extensive array of issues beyond the scope of conventional computers. Consequently, quantum computing machines create new risks at a v
Externí odkaz:
https://doaj.org/article/eaea5d98e9894d2f85b133eb5b9c78b9
Autor:
Sedigheh Khajouei-Nejad, Hamid Haj Seyyed Javadi, Sam Jabbehdari, Seyed Mohammad Hossein Moattar
Publikováno v:
International Journal of Information and Communication Technology Research, Vol 16, Iss 1, Pp 20-27 (2024)
—In order to provide access control on encrypted data, Attribute-based encryption (ABE) defines each user using a set of attributes. Fuzzy identity-based encryption (FIBE) is a variant of ABE that allows for a threshold access structure for users.
Externí odkaz:
https://doaj.org/article/cb08b0d2c08445bcbbeac848e4b3ab57
Publikováno v:
Journal of Mathematical Cryptology, Vol 18, Iss 1, Pp 84-93 (2024)
We address the problem of user fast revocation in the lattice-based Ciphertext Policy Attribute-Based Encryption (CP-ABE) by extending the scheme originally introduced by Zhang and Zhang [Zhang J, Zhang Z. A ciphertext policy attribute-based encrypti
Externí odkaz:
https://doaj.org/article/88d4d4309da343049c8a0f81dacae116
Autor:
Dharminder Chaudhary, Pradeep Kumar Dadsena, A. Padmavathi, Mohammad Mehedi Hassan, Bader Fahad Alkhamees, Uddeshaya Kumar
Publikováno v:
IEEE Access, Vol 12, Pp 74572-74585 (2024)
Once the shared secret key is established, three parties can use it for secure communication using symmetric-key encryption AES (128, 192, 256) algorithms or other cryptographic primitives. Although there are few third-party post-quantum authenticati
Externí odkaz:
https://doaj.org/article/ac4131b932ac4066a698e7934249452b
Publikováno v:
IEEE Access, Vol 12, Pp 25501-25511 (2024)
This paper presents the design and FPGA implementation of a hardware accelerator for the Post-Quantum CRYSTALS-Kyber and CRYSTALS-Dilithium algorithms, named CRYPHTOR (CRYstals Polynomial HW acceleraTOR). The proposed architecture includes a unified
Externí odkaz:
https://doaj.org/article/7cb28f5139824390b363c331df9ecfa2
Publikováno v:
Entropy, Vol 26, Iss 9, p 793 (2024)
The existing lattice-based cut-and-choose oblivious transfer protocol is constructed based on the learning-with-errors (LWE) problem, which generally has the problem of inefficiency. An efficient cut-and-choose oblivious transfer protocol is proposed
Externí odkaz:
https://doaj.org/article/bf6b7465cc154738bb5cfda80f8c687a
Publikováno v:
Cybersecurity, Vol 6, Iss 1, Pp 1-17 (2023)
Abstract The Learning With Errors (LWE) problem is widely used in lattice-based cryptography, which is the most promising post-quantum cryptography direction. There are a variety of LWE-solving methods, which can be classified into four groups: latti
Externí odkaz:
https://doaj.org/article/a5af35eb4e1e40c68a65e3e0d7e6c2b4
Publikováno v:
Journal of Workplace Learning, 2023, Vol. 35, Issue 5, pp. 432-449.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/JWL-12-2022-0177
Publikováno v:
Mathematics, Vol 12, Iss 11, p 1769 (2024)
In order to resist the security risks caused by quantum computing, post-quantum cryptography (PQC) has been a research focus. Constructing a key encapsulation mechanism (KEM) based on lattices is one of the promising PQC routines. The algebraically s
Externí odkaz:
https://doaj.org/article/999a97f8003a4525961be7ffe36605bf
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.