Sep 18, 2023 · In this work, we construct the first LWE-based UPKE scheme with polynomial modulus-to-noise rate, which is CPA-secure in the standard model.
Dec 18, 2023 · In this work, we construct the first LWE-based UPKE scheme with polynomial modulus-to-noise rate, which is CPA-secure in the standard model.
Updatable public key encryption has recently been introduced as a solution to achieve forward-security in the context of secure group messaging without ...
People also ask
What is the most popular public key encryption algorithm?
What is an example of a public key encryption algorithm?
How to encrypt with public key?
What are the public key encryption techniques?
Nov 7, 2022 · In this paper, we first provide a drastically more efficient UPKE realization in the standard model using Paillier's Composite Residuosity (DCR) assumption.
We show how to obtain a communication efficient protocol for batch cryptographic counters. (better than the batch protocol that is obtained through the trivial ...
In this paper, we present an efficient software implementation of lattice based Ring-LWE public key encryption scheme, which optimizes the two basic building ...
Abou Haidar, C., Libert, B., Passelègue, A.: Updatable public key encryption from DCR: efficient constructions with stronger security. In: CCS (2022)
Jul 26, 2022 · In UPKE, key updates can be triggered by any sender – via special update ciphertexts – willing to enforce the forward secrecy of its encrypted ...
Mar 11, 2023 · We propose a lattice-based Ciphertext-Policy Attribute-Based Encryption(CP-ABE) scheme, which is designed based on the ring learing with error problem.
In this paper, we present an efficient lattice-based public key searchable encryption with fine-grained access control for edge computing.