Search
Search Results
-
On the Hardness of Scheme-Switching Between SIMD FHE Schemes
Fully homomorphic encryption (FHE) schemes are either lightweight and can evaluate boolean circuits or are relatively heavy and can evaluate... -
Proactive visual cryptographic schemes for general access structures
In the modern digital era, long-term protection of digital data, stored in a server, is essential, especially when it is in the format of medical...
-
Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives
The Internet of Things (IoT) is increasingly becoming widespread in different areas such as healthcare, transportation, and manufacturing. IoT...
-
Constructing Pairing Free Unbounded Inner Product Functional Encryption Schemes with Unbounded Inner Product Policy
Inner product functional encryption (IPFE) is a promising advanced cryptographic primitive for the inner product function class that facilitates... -
Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives
With the rise of cloud computing, multi-user scenarios have become a common setting for data sharing nowadays. The conservative security notion might...
-
Parallel Algorithms for Simulation of the Suspension Transport in Coastal Systems Based on the Explicit-Implicit and Splitting Schemes
We consider two difference schemes that describe the convective-diffusion transfer and settling of multifractional suspensions in coastal systems.... -
Multi-key and Multi-input Predicate Encryption (for Conjunctions) from Learning with Errors
We put forward two natural generalizations of predicate encryption (PE), dubbed multi-key and multi-input PE. More in details, our contributions are...
-
Multi-key and Multi-input Predicate Encryption from Learning with Errors
We put forward two natural generalizations of predicate encryption (PE), dubbed multi-key and multi-input PE. More in details, our contributions are... -
Approximate Processing Element Design and Analysis for the Implementation of CNN Accelerators
As a primary computation unit, a processing element (PE) is key to the energy efficiency of a convolutional neural network (CNN) accelerator. Taking...
-
Adaptive feedforward RBF neural network control with the deterministic persistence of excitation
Based on the partial persistence of excitation (PE), the recent deterministic learning theory of adaptive RBF neural network (RBFNN) control can just...
-
Teaching quality monitoring and evaluation of physical education teaching in ordinary college based on edge computing optimization model
This paper explores the potential of edge computing and artificial intelligence to improve the quality evaluation of physical education (PE) teaching...
-
Collaborative Intrusion Detection Schemes in Fog-to-Things Computing
The adoption of the Internet of Things (IoT) has raised a significant concern of cyber-attacks at the edge of the network. As the existing... -
A geometric framework for multiclass ensemble classifiers
Ensemble classifiers have been investigated by many in the artificial intelligence and machine learning community. Majority voting and weighted...
-
Maliciously circuit-private multi-key FHE and MPC based on LWE
In this paper, we construct multi-key homomorphic and fully homomorphic encryption (resp. MKHE and MKFHE) schemes with malicious circuit privacy. Our...
-
Fine-Grained Secure Attribute-Based Encryption
Fine-grained cryptography is constructing cryptosystems in a setting where an adversary’s resource is a-prior bounded and an honest party has less...
-
RLWE-based public key searchable encryption: securer, faster, and lower end-to-end delay for cloud computing
Cloud storage and computing offer significant convenience and management efficiency in the information era. Privacy protection is a major challenge...
-
On the security of functional encryption in the generic group model
In the context of functional encryption (FE), a weak security notion called selective security , which enforces the adversary to complete a challenge...
-
Reversible data hiding in encrypted images with block-based bit-plane reallocation
As cloud storage and multimedia communication continue to evolve, the preservation of image privacy is becoming increasingly important. Reversible...
-
Unified intercept probability analysis of multi-user multi-relay aided decode-and-forward wireless systems
This paper investigates a cooperative network scenario involving a source, multiple users, and relays, all situated in the presence of multiple...
-
CLSM-IEA: a novel cosine-logistic-sine map and its application in a new image encryption scheme
Chaotic systems have initial value sensitivity, unpredictability, and random-like properties, which are widely employed in image encryption schemes....