We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 5,536 results
  1. On the Hardness of Scheme-Switching Between SIMD FHE Schemes

    Fully homomorphic encryption (FHE) schemes are either lightweight and can evaluate boolean circuits or are relatively heavy and can evaluate...
    Karim Eldefrawy, Nicholas Genise, Nathan Manohar in Post-Quantum Cryptography
    Conference paper 2023
  2. Proactive visual cryptographic schemes for general access structures

    In the modern digital era, long-term protection of digital data, stored in a server, is essential, especially when it is in the format of medical...

    Praveen K, Sabyasachi Dutta, ... Sethumadhavan M in Multimedia Tools and Applications
    Article 04 April 2023
  3. Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives

    The Internet of Things (IoT) is increasingly becoming widespread in different areas such as healthcare, transportation, and manufacturing. IoT...

    Mahdi R. Alagheband, Atefeh Mashatan in The Journal of Supercomputing
    Article Open access 13 June 2022
  4. Constructing Pairing Free Unbounded Inner Product Functional Encryption Schemes with Unbounded Inner Product Policy

    Inner product functional encryption (IPFE) is a promising advanced cryptographic primitive for the inner product function class that facilitates...
    Subhranil Dutta, Ratna Dutta, Sourav Mukhopadhyay in Innovative Security Solutions for Information Technology and Communications
    Conference paper 2023
  5. Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives

    With the rise of cloud computing, multi-user scenarios have become a common setting for data sharing nowadays. The conservative security notion might...

    Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso in Designs, Codes and Cryptography
    Article 20 January 2024
  6. Parallel Algorithms for Simulation of the Suspension Transport in Coastal Systems Based on the Explicit-Implicit and Splitting Schemes

    We consider two difference schemes that describe the convective-diffusion transfer and settling of multifractional suspensions in coastal systems....
    A. I. Sukhinov, A. E. Chistyakov, ... M. V. Porksheyan in Parallel Computational Technologies
    Conference paper 2023
  7. Multi-key and Multi-input Predicate Encryption (for Conjunctions) from Learning with Errors

    We put forward two natural generalizations of predicate encryption (PE), dubbed multi-key and multi-input PE. More in details, our contributions are...

    Danilo Francati, Daniele Friolo, ... Daniele Venturi in Journal of Cryptology
    Article Open access 14 May 2024
  8. Multi-key and Multi-input Predicate Encryption from Learning with Errors

    We put forward two natural generalizations of predicate encryption (PE), dubbed multi-key and multi-input PE. More in details, our contributions are...
    Danilo Francati, Daniele Friolo, ... Daniele Venturi in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
  9. Approximate Processing Element Design and Analysis for the Implementation of CNN Accelerators

    As a primary computation unit, a processing element (PE) is key to the energy efficiency of a convolutional neural network (CNN) accelerator. Taking...

    Tong Li, Hong-Lan Jiang, ... Zhi-Gang Mao in Journal of Computer Science and Technology
    Article 30 March 2023
  10. Adaptive feedforward RBF neural network control with the deterministic persistence of excitation

    Based on the partial persistence of excitation (PE), the recent deterministic learning theory of adaptive RBF neural network (RBFNN) control can just...

    Qiong Liu, Dongyu Li, ... Ye Guo in Neural Computing and Applications
    Article 01 September 2021
  11. Teaching quality monitoring and evaluation of physical education teaching in ordinary college based on edge computing optimization model

    This paper explores the potential of edge computing and artificial intelligence to improve the quality evaluation of physical education (PE) teaching...

    Junbo Zhang, Cheng Zhang in The Journal of Supercomputing
    Article 28 April 2023
  12. Collaborative Intrusion Detection Schemes in Fog-to-Things Computing

    The adoption of the Internet of Things (IoT) has raised a significant concern of cyber-attacks at the edge of the network. As the existing...
    Abebe Diro, Abdun Mahmood, Naveen Chilamkurti in Fog/Edge Computing For Security, Privacy, and Applications
    Chapter 2021
  13. A geometric framework for multiclass ensemble classifiers

    Ensemble classifiers have been investigated by many in the artificial intelligence and machine learning community. Majority voting and weighted...

    Shengli Wu, **long Li, Weimin Ding in Machine Learning
    Article Open access 27 September 2023
  14. Maliciously circuit-private multi-key FHE and MPC based on LWE

    In this paper, we construct multi-key homomorphic and fully homomorphic encryption (resp. MKHE and MKFHE) schemes with malicious circuit privacy. Our...

    Nuttapong Attrapadung, Goichiro Hanaoka, ... Jacob C. N. Schuldt in Designs, Codes and Cryptography
    Article Open access 30 December 2022
  15. Fine-Grained Secure Attribute-Based Encryption

    Fine-grained cryptography is constructing cryptosystems in a setting where an adversary’s resource is a-prior bounded and an honest party has less...

    Yuyu Wang, Jiaxin Pan, Yu Chen in Journal of Cryptology
    Article 03 August 2023
  16. RLWE-based public key searchable encryption: securer, faster, and lower end-to-end delay for cloud computing

    Cloud storage and computing offer significant convenience and management efficiency in the information era. Privacy protection is a major challenge...

    Lijun Qi, **cheng Zhuang in The Journal of Supercomputing
    Article 21 August 2023
  17. On the security of functional encryption in the generic group model

    In the context of functional encryption (FE), a weak security notion called selective security , which enforces the adversary to complete a challenge...

    Hyung Tae Lee, Jae Hong Seo in Designs, Codes and Cryptography
    Article 27 May 2023
  18. Reversible data hiding in encrypted images with block-based bit-plane reallocation

    As cloud storage and multimedia communication continue to evolve, the preservation of image privacy is becoming increasingly important. Reversible...

    Li Liu, Chaofan Chen, ... Anhong Wang in Multimedia Tools and Applications
    Article 22 May 2024
  19. Unified intercept probability analysis of multi-user multi-relay aided decode-and-forward wireless systems

    This paper investigates a cooperative network scenario involving a source, multiple users, and relays, all situated in the presence of multiple...

    Sudakar Singh Chauhan, Ruchi Devlal, ... Seema Narwal in International Journal of Information Technology
    Article 11 March 2024
  20. CLSM-IEA: a novel cosine-logistic-sine map and its application in a new image encryption scheme

    Chaotic systems have initial value sensitivity, unpredictability, and random-like properties, which are widely employed in image encryption schemes....

    **aosong Gao, **ngbin Liu in Signal, Image and Video Processing
    Article 05 February 2024
Did you find what you were looking for? Share feedback.