Search Results - "Learning with errors problem"
-
1
Hardness of (M)LWE with semi-uniform seeds
ISSN: 0304-3975, 1879-2294Published: Elsevier B.V 01.05.2024Published in Theoretical computer science (01.05.2024)“…Let (D,S,χ,m)-LWEn,q be the LWE problem in matrix form (A,y=As+emodq), where A,s,e are randomly chosen respectively from the seed distribution D over Zqm×n,…”
Get full text
Journal Article -
2
Post-quantum identity-based traitor tracing
ISSN: 2214-2126Published: Elsevier Ltd 01.09.2024Published in Journal of information security and applications (01.09.2024)“…In the distribution of digital content, users may collude and utilize their secret keys to create pirate decoders which enable illegally users to receive the…”
Get full text
Journal Article -
3
Efficient secure channel free identity-based searchable encryption schemes with privacy preserving for cloud storage service
ISSN: 1383-7621, 1873-6165Published: Elsevier B.V 01.04.2024Published in Journal of systems architecture (01.04.2024)“…Cloud storage is a basic service model of the cloud computing. Since the cloud data is stored in the ciphertext for the data confidentiality, how to search the…”
Get full text
Journal Article -
4
Compact and Flexible KEM From Ideal Lattice
ISSN: 0018-9448, 1557-9654Published: New York IEEE 01.06.2022Published in IEEE transactions on information theory (01.06.2022)“…A remarkable breakthrough in mathematics in recent years is the proof of the long-standing conjecture: sphere packing in the <inline-formula> <tex-math…”
Get full text
Journal Article -
5
Lattice-based signcryption with equality test in standard model
ISSN: 0920-5489, 1872-7018Published: Amsterdam Elsevier B.V 01.06.2021Published in Computer standards and interfaces (01.06.2021)“…•We propose, for the first time, a lattice-based signcryption scheme possessing a capacity of equality test provably secure in the standard model.•We consider…”
Get full text
Journal Article -
6
LPbT-SSO: Password-Based Threshold Single-Sign-On Authentication From LWE
ISSN: 1545-5971, 1941-0018Published: Washington IEEE 01.01.2025Published in IEEE transactions on dependable and secure computing (01.01.2025)“…In networks, clients access various servers. Servers need to authenticate clients' identities and provide services to clients who pass the authentication…”
Get full text
Journal Article -
7
An Efficient Identity-Based Encryption With Equality Test in Cloud Computing
ISSN: 2168-7161, 2372-0018Published: Piscataway IEEE 01.07.2023Published in IEEE transactions on cloud computing (01.07.2023)“…Identity-based encryption with equality test (IBEET) provides a feasible way for cloud server partitioning or searching on ciphertexts in the cloud. In that…”
Get full text
Journal Article -
8
An Efficient Lattice-Based Verifiable Public-Key Authenticated Encryption With Keyword Search Scheme
ISSN: 2169-3536Published: Piscataway IEEE 2025Published in IEEE access (2025)“…Searchable encryption enables efficient retrieval of encrypted data stored in cloud environments while preserving data confidentiality. Within this context,…”
Get full text
Journal Article -
9
An improved BKW algorithm on the learning with rounding problem
ISSN: 2523-3246, 2523-3246Published: Singapore Springer Nature Singapore 01.12.2025Published in Cybersecurity (Singapore) (01.12.2025)“…The Blum-Kalai-Wasserman (BKW) algorithm is a significant combinatorial algorithm used to tackle the Learning with Errors (LWE) and Learning with Rounding…”
Get full text
Journal Article -
10
A detailed analysis of primal attack and its variants
ISSN: 1674-733X, 1869-1919Published: Beijing Science China Press 01.03.2022Published in Science China. Information sciences (01.03.2022)“…Primal attack is a typically considered strategy to estimate the hardness of cryptosystem based on learning with errors problem (LWE), it reduces the LWE…”
Get full text
Journal Article -
11
Security estimation of LWE via BKW algorithms
ISSN: 2523-3246, 2523-3246Published: Singapore Springer Nature Singapore 01.12.2023Published in Cybersecurity (Singapore) (01.12.2023)“…The Learning With Errors (LWE) problem is widely used in lattice-based cryptography, which is the most promising post-quantum cryptography direction. There are…”
Get full text
Journal Article -
12
Lattice-Based Key-Aggregate (Searchable) Encryption in Cloud Storage
ISSN: 2169-3536, 2169-3536Published: Piscataway IEEE 2019Published in IEEE access (2019)“…In cloud storage, selectively sharing encrypted data is becoming increasingly important. One key design challenge is the management of encryption keys…”
Get full text
Journal Article -
13
Estimation of the hardness of the learning with errors problem with a restricted number of samples
ISSN: 1862-2976, 1862-2984Published: De Gruyter 01.03.2019Published in Journal of mathematical cryptology (01.03.2019)“…The Learning With Errors (LWE) problem is one of the most important hardness assumptions lattice-based constructions base their security on. In 2015, Albrecht,…”
Get full text
Journal Article -
14
Full secure identity-based encryption scheme with short public key size over lattices in the standard model
ISSN: 0020-7160, 1029-0265Published: Abingdon Taylor & Francis 02.06.2016Published in International journal of computer mathematics (02.06.2016)“…An efficient identity-based encryption (IBE) scheme over lattice is proposed in this paper. Under the hardness of the learning with errors (LWE) problem, the…”
Get full text
Journal Article -
15
基于R-SIS和R-LWE构建的IBE加密方案
ISSN: 1002-137XPublished: 中国科学院大学 北京 101408%中国科学院重庆绿色智能技术研究院自动推理与认知重庆市重点实验室 重庆400714 15.06.2021Published in 计算机科学 (15.06.2021)“…TP309; 格上基于身份的加密机制(Identity-Based Encryption,IBE)能够有效抵抗量子攻击,并且该机制将每个人的身份信息作为公钥,能够简化公钥基础设施(Public Key…”
Get full text
Journal Article -
16
A lattice-based signcryption scheme without random oracles
ISSN: 2095-2228, 2095-2236Published: Heidelberg Higher Education Press 01.08.2014Published in Frontiers of Computer Science (01.08.2014)“…In order to achieve secure signcryption schemes in the quantum era, Li Fagen et al. [Concurrency and Computation: Practice and Experience, 2012, 25(4):…”
Get full text
Journal Article -
17
Efficient hierarchical identity based encryption scheme in the standard model over lattices
ISSN: 2095-9184, 2095-9230Published: Hangzhou Zhejiang University Press 01.08.2016Published in Frontiers of information technology & electronic engineering (01.08.2016)“…Using lattice basis delegation in a fixed dimension, we propose an efficient lattice-based hierarchical identity based encryption(HIBE) scheme in the…”
Get full text
Journal Article -
18
全同态加密具体安全参数分析
ISSN: 2097-4116Published: Beijing Chinese Association for Cryptologic Research, Journal of Cryptologic Research 31.10.2016Published in Journal of Cryptologic Research (31.10.2016)“…为了保证全同态加密的安全使用, 以及衡量分析全同态加密方案的效率, 提出一个计算分析LWE上全同态加密具体安全参数的通用方法, 该方法同样适用于环LWE上的全同态加密. 该…”
Get full text
Journal Article -
19
Full Secure Identity-Based Encryption Scheme over Lattices in the Standard Model
Published: IEEE 01.11.2015Published in 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC) (01.11.2015)“…Using a known lattice-based chosen plain-text secure encryption scheme and the Bonsai trees primitive, a identity-based encryption (IBE) scheme is proposed in…”
Get full text
Conference Proceeding -
20
Lattice-Based Dynamical and Anonymous Broadcast Encryption Scheme
Published: IEEE 01.11.2015Published in 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC) (01.11.2015)“…This paper proposes a broadcast encryption scheme over lattice which is dynamical and anonymous simultaneously. The dynamic property means that the authorized…”
Get full text
Conference Proceeding