comparemela.com

Public Key Encryption News Today : Breaking News, Live Updates & Top Stories | Vimarsana

A lattice-based public key encryption scheme with delegated equality t by Kaifeng Xiao, Xinjian Chen et al

When data security is facing growing threats, ordinary encryption techniques cannot meet the needs of comparing, sharing, and classifying data hidden in ciphertexts. At the same time, the advent of the quantum computing era has brought unprecedented challenges to traditional cryptography. Fortunately, a lattice-based PKEET scheme can solve the above problems. In this paper, we design a lattice-based PKE-DET scheme that can support the delegated tester function with satisfying anti-quantum computing security and resisting OMRA attacks. To the best of our knowledge, this is the first PKE-DET scheme that has both kinds of security at the same time. Under the standard model, we prove the security of the scheme based on the LWE hardness assumption. Compared with existing schemes, our scheme has many advantages, such as high security, delegated tester authorization, and small storage space.

GitHub - incuna/django-pgcrypto-fields: Transparent field level encryption for Django using the pgcrypto postgresql extension

Transparent field level encryption for Django using the pgcrypto postgresql extension. - GitHub - incuna/django-pgcrypto-fields: Transparent field level encryption for Django using the pgcrypto postgresql extension.

Contributions to Lattice–based Cryptography by Quoc Huy Le

Post–quantum cryptography (PQC) is a new and fast–growing part of Cryptography. It focuses on developing cryptographic algorithms and protocols that resist quantum adversaries (i.e., the adversaries who have access to quantum computers). To construct a new PQC primitive, a designer must use a mathematical problem intractable for the quantum adversary. Many intractability assumptions are being used in PQC. There seems to be a consensus in the research community that the most promising are intractable/hard problems in lattices. However, lattice–based cryptography still needs more research to make it more efficient and practical. The thesis contributes toward achieving either the novelty or the practicality of lattice– based cryptographic systems.

A more efficient public-key authenticated encryption scheme with keywo by Qiong Huang, Peisen Huang et al

To realize ciphertext retrieval without decryption in the public key settings, Boneh et al. in 2004 proposed a cryptographic primitive named Public-key Encryption with Keyword Search (PEKS) and proposed the first PEKS scheme. Following Boneh et al.’s work, various PEKS schemes were proposed; however, most schemes are vulnerable to inside keyword guessing attacks (IKGA). Huang and Li proposed a new primitive named Public-key Authenticated Encryption with Keyword Search (PAEKS) in 2017, which resists the IKGA in the setting of only one test server. Their main idea to resist IKGA is to require the data sender to authenticate the ciphertext while encrypting a keyword. However, in the era of big data, as the number of encrypted files increases, huge storage overhead and heavy retrieval costs become problems in PAEKS. In this paper, we proposed a new PAEKS scheme that costs low storage space and supports fast search. We introduced the ciphertext deduplication into PAEKS to reduce storage s

Wednesday, August 3, 2022 | Daily Bulletin

Nine on the way to a billion By Jon Parsons. This article was originally published on Waterloo News. Nine startups with links to the University of Waterloo were named in a recent report tracking Canadian companies on their way to $1 billion annual revenues, including four companies that grew out of Waterloo’s renowned entrepreneurship program and startup incubator Velocity.

© 2025 Vimarsana

vimarsana © 2020. All Rights Reserved.