نتایج جستجو برای: lattice based cryptography

تعداد نتایج: 3032580  

Journal: :IACR Cryptology ePrint Archive 2017
Núria Costa Ramiro Martínez Paz Morillo

In this paper we present the first proof of a shuffle for latticebased cryptography which can be used to build a universally verifiable mix-net capable of mixing votes encrypted with a post-quantum algorithm, thus achieving long-term privacy. Universal verifiability is achieved by means of the publication of a non-interactive zero knowledge proof of a shuffle generated by each mix-node which ca...

Journal: :Applied sciences 2021

Lattice and code cryptography can replace existing schemes such as elliptic curve because of their resistance to quantum computers. In support public key infrastructures, the distribution, validation storage cryptographic keys is then more complex for handling longer keys. This paper describes practical ways generate from physical unclonable functions, both lattice code-based cryptography. Hand...

Journal: :IACR Cryptology ePrint Archive 2016
Thomas Espitau Pierre-Alain Fouque Benoît Gérard Mehdi Tibouchi

As the advent of general-purpose quantum computers appears to be drawing closer, agencies and advisory bodies have started recommending that we prepare the transition away from factoring and discrete logarithm-based cryptography, and towards postquantum secure constructions, such as lattice-based schemes. Almost all primitives of classical cryptography (and more!) can be realized with lattices,...

Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...

Journal: :IACR Cryptology ePrint Archive 2011
Shweta Agrawal David Mandell Freeman Vinod Vaikuntanathan

We propose a lattice-based functional encryption scheme for inner product predicates whose security follows from the difficulty of the learning with errors (LWE) problem. This construction allows us to achieve applications such as range and subset queries, polynomial evaluation, and CNF/DNF formulas on encrypted data. Our scheme supports inner products over small fields, in contrast to earlier ...

2015
Satrajit Ghosh Aniket Kate

The onion routing (OR) network Tor provides anonymity to its users by routing their encrypted traffic through three proxies (or nodes). The key cryptographic challenge, here, is to establish symmetric session keys using a secure key exchange between the anonymous user and the selected nodes. The Tor network currently employs a one-way authenticated key exchange (1W-AKE) protocol ntor for this p...

2014
Satrajit Ghosh Aniket Kate

The onion routing (OR) network Tor provides anonymity to its users by routing their encrypted traffic through three proxies (or nodes). The key cryptographic challenge, here, is to establish symmetric session keys using a secure key exchange between the anonymous users and the selected nodes. The Tor network currently employs a one-way authenticated key exchange (1W-AKE) protocol ntor for this ...

2017
Daniel J. Bernstein Chitchanok Chuengsatiansup Tanja Lange Christine van Vredendaal

Several ideal-lattice-based cryptosystems have been broken by recent attacks that exploit special structures of the rings used in those cryptosystems. The same structures are also used in the leading proposals for post-quantum lattice-based cryptography, including the classic NTRU cryptosystem and typical Ring-LWE-based cryptosystems. This paper (1) proposes NTRU Prime, which tweaks NTRU to use...

Journal: :Journal of Cryptology 2022

Abstract The Learning with Errors (LWE) problem is the fundamental backbone of modern lattice-based cryptography, allowing one to establish cryptography on hardness well-studied computational problems. However, schemes based LWE are often impractical, so Ring was introduced as a form ‘structured’ LWE, trading off hard quantify loss security for an increase in efficiency by working over well-cho...

2012
Marco Scianna M. Scianna

Multiscale problems are ubiquitous in all biological phenomena, which emerge from the complex interaction between processes happening at various levels. A number of mathematical approaches have been developed to address such an intricate network of organization. Among others, the cellular Potts model is particularly well-known and widespread. The CPM is a discrete, lattice-based, flexible techn...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید