Short Integer Solution News Today : Breaking News, Live Updates & Top Stories | Vimarsana

Stay updated with breaking news from Short integer solution. Get real-time updates on events, politics, business, and more. Visit us for reliable news and exclusive interviews.

Top News In Short Integer Solution Today - Breaking & Trending Today

"A fully secure lattice-based signcryption with designated equality tes" by Kaifeng Xiao, Xinjian Chen et al.

In hospital information systems, large volumes of electronic diagnostic records (EDRs) take up most of the storage space. While cloud server providers can reduce the local storage burden on hospitals and provide data-sharing services, the potential threat of sensitive data leakage and non-traceability of diagnoses prevents hospitals from uploading patients' diagnostic records to remote cloud servers directly. Therefore, to address security and traceability issues, we propose a new construction of post-quantum secure signcryption scheme with a designated equality test based on lattices (LB-SCDET) in this paper. Our LB-SCDET scheme allows a designated tester to perform equality tests on signcrypt-ciphertexts of EDRs without leaking what the EDRs actually are. Compared to the recent LB-SCET scheme proposed by Le et al., our LB-SCDET scheme implements a designated mechanism and is secure against offline message recovery attacks (OMRA). The comparison shows that our scheme enjoys a hig ....

Designated Equality Test , Lectronic Diagnostic Records , Learning With Errors , Ffline Message Recovery Attack , Short Integer Solution ,

"Chosen-ciphertext lattice-based public key encryption with equality te" by Dung Hoang Duong, Partha Sarathi Roy et al.

With the rapid growth of cloud storage and cloud computing services, many organizations and users choose to store the data on a cloud server for saving costs. However, due to security concerns, data of users would be encrypted before sending to the cloud. However, this hinders a problem of computation on encrypted data in the cloud, especially in the case of performing data matching in various medical scenarios. Public key encryption with equality test (PKEET) is a powerful tool that allows the authorized cloud server to check whether two ciphertexts are generated by the same message. PKEET has then become a promising candidate for many practical applications like efficient data management on encrypted databases. Lee et al. (Information Sciences 2020) proposed a generic construction of PKEET schemes in the standard model and hence it is possible to yield the first instantiation of post-quantum PKEET schemes based on lattices. At ACISP 2019, Duong et al. proposed a direct construction o ....

Information Sciences , Cloud Computing , Quality Test , Learning With Errors , Post Quantum Cryptography , Short Integer Solution ,

"Forward-Secure Group Encryptions from Lattices" by Jing Pan, Xiaofeng Chen et al.

Group encryption (GE) is a fundamental anonymity primitive analogue of group signature, which guarantees the decryption ability of recipients to specific ciphertexts while hiding these users within a crowd. Since its first birth by Kiayias et al., numerous constructions have been proposed, among which there is only one lattice-based scheme is post-quantum secure. However, the security of all these schemes will be damaged once an unexpected key-exposure attack occurs (which is extremely unavoidable in the real world). To solve this problem, we first consider a forward-secure group encryption primitive and provide a concrete instantiation over lattices, which efficiently mitigates the threats from both key exposure and quantum computation. The key idea is to introduce an appropriate periodical key-updating mechanism into the group encryptions to restrain any key-exposure adversary from breaking ciphertexts generated in prior time periods. Concretely, we modify the Agrawal-Boneh-Boyen HIB ....

Agrawal Boneh Boyen Hibes , Short Integer Solution , Learning With Errors , Binary Tree Encryption , Forward Security , Roup Encryption , Ey Updating , Attice Cryptography ,