Search Results - "Learning with errors problem"

Refine Results
  1. 1

    Hardness of (M)LWE with semi-uniform seeds by Jia, Wenjuan, Zhang, Jiang, Xiang, Binwu, Wang, Baocang

    ISSN: 0304-3975, 1879-2294
    Published: Elsevier B.V 01.05.2024
    Published in Theoretical computer science (01.05.2024)
    “…Let (D,S,χ,m)-LWEn,q be the LWE problem in matrix form (A,y=As+emodq), where A,s,e are randomly chosen respectively from the seed distribution D over Zqm×n,…”
    Get full text
    Journal Article
  2. 2

    Post-quantum identity-based traitor tracing by Yang, Zhichao, He, Debiao, Chen, Rongmao, Wang, Shixiong, Xu, Jianqiao

    ISSN: 2214-2126
    Published: Elsevier Ltd 01.09.2024
    “…In the distribution of digital content, users may collude and utilize their secret keys to create pirate decoders which enable illegally users to receive the…”
    Get full text
    Journal Article
  3. 3

    Efficient secure channel free identity-based searchable encryption schemes with privacy preserving for cloud storage service by Wang, Fenghe, Xiao, Han, Wang, Junquan, Wang, Ye, Cao, Chengliang

    ISSN: 1383-7621, 1873-6165
    Published: Elsevier B.V 01.04.2024
    Published in Journal of systems architecture (01.04.2024)
    “…Cloud storage is a basic service model of the cloud computing. Since the cloud data is stored in the ciphertext for the data confidentiality, how to search the…”
    Get full text
    Journal Article
  4. 4

    Compact and Flexible KEM From Ideal Lattice by Jin, Zhengzhong, Shen, Shiyu, Zhao, Yunlei

    ISSN: 0018-9448, 1557-9654
    Published: New York IEEE 01.06.2022
    Published in IEEE transactions on information theory (01.06.2022)
    “…A remarkable breakthrough in mathematics in recent years is the proof of the long-standing conjecture: sphere packing in the <inline-formula> <tex-math…”
    Get full text
    Journal Article
  5. 5

    Lattice-based signcryption with equality test in standard model by Le, Huy Quoc, Duong, Dung Hoang, Roy, Partha Sarathi, Susilo, Willy, Fukushima, Kazuhide, Kiyomoto, Shinsaku

    ISSN: 0920-5489, 1872-7018
    Published: Amsterdam Elsevier B.V 01.06.2021
    Published in Computer standards and interfaces (01.06.2021)
    “…•We propose, for the first time, a lattice-based signcryption scheme possessing a capacity of equality test provably secure in the standard model.•We consider…”
    Get full text
    Journal Article
  6. 6

    LPbT-SSO: Password-Based Threshold Single-Sign-On Authentication From LWE by Cao, Chenchen, Xu, Chunxiang, Jiang, Changsong, Zhang, Zhao, Dong, Xinfeng, Chen, Kefei

    ISSN: 1545-5971, 1941-0018
    Published: Washington IEEE 01.01.2025
    “…In networks, clients access various servers. Servers need to authenticate clients' identities and provide services to clients who pass the authentication…”
    Get full text
    Journal Article
  7. 7

    An Efficient Identity-Based Encryption With Equality Test in Cloud Computing by Yang, Zhichao, He, Debiao, Qu, Longjiang, Ye, Qing

    ISSN: 2168-7161, 2372-0018
    Published: Piscataway IEEE 01.07.2023
    Published in IEEE transactions on cloud computing (01.07.2023)
    “…Identity-based encryption with equality test (IBEET) provides a feasible way for cloud server partitioning or searching on ciphertexts in the cloud. In that…”
    Get full text
    Journal Article
  8. 8

    An Efficient Lattice-Based Verifiable Public-Key Authenticated Encryption With Keyword Search Scheme by Karimani, Saba, Eghlidos, Taraneh

    ISSN: 2169-3536
    Published: Piscataway IEEE 2025
    Published in IEEE access (2025)
    “…Searchable encryption enables efficient retrieval of encrypted data stored in cloud environments while preserving data confidentiality. Within this context,…”
    Get full text
    Journal Article
  9. 9

    An improved BKW algorithm on the learning with rounding problem by Wei, Yu, Bi, Lei, Wang, Kunpeng, Lu, Xianhui

    ISSN: 2523-3246, 2523-3246
    Published: Singapore Springer Nature Singapore 01.12.2025
    Published in Cybersecurity (Singapore) (01.12.2025)
    “…The Blum-Kalai-Wasserman (BKW) algorithm is a significant combinatorial algorithm used to tackle the Learning with Errors (LWE) and Learning with Rounding…”
    Get full text
    Journal Article
  10. 10

    A detailed analysis of primal attack and its variants by Zhang, Xue, Zheng, Zhongxiang, Wang, Xiaoyun

    ISSN: 1674-733X, 1869-1919
    Published: Beijing Science China Press 01.03.2022
    Published in Science China. Information sciences (01.03.2022)
    “…Primal attack is a typically considered strategy to estimate the hardness of cryptosystem based on learning with errors problem (LWE), it reduces the LWE…”
    Get full text
    Journal Article
  11. 11

    Security estimation of LWE via BKW algorithms by Wei, Yu, Bi, Lei, Lu, Xianhui, Wang, Kunpeng

    ISSN: 2523-3246, 2523-3246
    Published: Singapore Springer Nature Singapore 01.12.2023
    Published in Cybersecurity (Singapore) (01.12.2023)
    “…The Learning With Errors (LWE) problem is widely used in lattice-based cryptography, which is the most promising post-quantum cryptography direction. There are…”
    Get full text
    Journal Article
  12. 12

    Lattice-Based Key-Aggregate (Searchable) Encryption in Cloud Storage by Yao, Yanqing, Zhai, Zhengde, Liu, Jianwei, Li, Zhoujun

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 2019
    Published in IEEE access (2019)
    “…In cloud storage, selectively sharing encrypted data is becoming increasingly important. One key design challenge is the management of encryption keys…”
    Get full text
    Journal Article
  13. 13

    Estimation of the hardness of the learning with errors problem with a restricted number of samples by Bindel Nina, Buchmann Johannes, Göpfert Florian, Schmidt Markus

    ISSN: 1862-2976, 1862-2984
    Published: De Gruyter 01.03.2019
    Published in Journal of mathematical cryptology (01.03.2019)
    “…The Learning With Errors (LWE) problem is one of the most important hardness assumptions lattice-based constructions base their security on. In 2015, Albrecht,…”
    Get full text
    Journal Article
  14. 14

    Full secure identity-based encryption scheme with short public key size over lattices in the standard model by Wang, Fenghe, Liu, ZhenHua, Wang, Chunxiao

    ISSN: 0020-7160, 1029-0265
    Published: Abingdon Taylor & Francis 02.06.2016
    “…An efficient identity-based encryption (IBE) scheme over lattice is proposed in this paper. Under the hardness of the learning with errors (LWE) problem, the…”
    Get full text
    Journal Article
  15. 15

    基于R-SIS和R-LWE构建的IBE加密方案 by 钱心缘, 吴文渊

    ISSN: 1002-137X
    Published: 中国科学院大学 北京 101408%中国科学院重庆绿色智能技术研究院自动推理与认知重庆市重点实验室 重庆400714 15.06.2021
    Published in 计算机科学 (15.06.2021)
    “…TP309; 格上基于身份的加密机制(Identity-Based Encryption,IBE)能够有效抵抗量子攻击,并且该机制将每个人的身份信息作为公钥,能够简化公钥基础设施(Public Key…”
    Get full text
    Journal Article
  16. 16

    A lattice-based signcryption scheme without random oracles by LU, Xiuhua, WEN, Qiaoyan, JIN, Zhengping, WANG, Licheng, YANG, Chunli

    ISSN: 2095-2228, 2095-2236
    Published: Heidelberg Higher Education Press 01.08.2014
    Published in Frontiers of Computer Science (01.08.2014)
    “…In order to achieve secure signcryption schemes in the quantum era, Li Fagen et al. [Concurrency and Computation: Practice and Experience, 2012, 25(4):…”
    Get full text
    Journal Article
  17. 17

    Efficient hierarchical identity based encryption scheme in the standard model over lattices by Wang, Feng-he, Wang, Chun-xiao, Liu, Zhen-hua

    ISSN: 2095-9184, 2095-9230
    Published: Hangzhou Zhejiang University Press 01.08.2016
    “…Using lattice basis delegation in a fixed dimension, we propose an efficient lattice-based hierarchical identity based encryption(HIBE) scheme in the…”
    Get full text
    Journal Article
  18. 18

    全同态加密具体安全参数分析 by CHEN, Zhi-Gang, Ya-Feng, SHI, Xin-Xia, SONG, 陈智罡, 石亚峰, 宋新霞

    ISSN: 2097-4116
    Published: Beijing Chinese Association for Cryptologic Research, Journal of Cryptologic Research 31.10.2016
    Published in Journal of Cryptologic Research (31.10.2016)
    “…为了保证全同态加密的安全使用, 以及衡量分析全同态加密方案的效率, 提出一个计算分析LWE上全同态加密具体安全参数的通用方法, 该方法同样适用于环LWE上的全同态加密. 该…”
    Get full text
    Journal Article
  19. 19

    Full Secure Identity-Based Encryption Scheme over Lattices in the Standard Model by Wang Jizhong, Wang Chunxiao

    Published: IEEE 01.11.2015
    “…Using a known lattice-based chosen plain-text secure encryption scheme and the Bonsai trees primitive, a identity-based encryption (IBE) scheme is proposed in…”
    Get full text
    Conference Proceeding
  20. 20

    Lattice-Based Dynamical and Anonymous Broadcast Encryption Scheme by Wang Fenghe, Wang Xuan, Wang Chunxiao

    Published: IEEE 01.11.2015
    “…This paper proposes a broadcast encryption scheme over lattice which is dynamical and anonymous simultaneously. The dynamic property means that the authorized…”
    Get full text
    Conference Proceeding