In this paper, we study the privacy-preserving distributed optimization problem, aiming to prevent attackers from stealing the private information of agents. For this purpose, we propose a novel privacy-preserving alg...
详细信息
This paper proposes a modified version of the Blowfish Algorithm using permutation techniques. These techniques are key parts of the F-function of the algorithm. The first modification is in the bit operations while t...
详细信息
Traditional approaches to vector similarity search over encrypted data rely on fully homomorphic encryption (FHE) to enable computation without decryption. However, the substantial computational overhead of FHE makes ...
详细信息
We present efficient algorithms for computing isogenies between hyperelliptic curves, leveraging higher genus curves to enhance cryptographic protocols in the post-quantum context. Our algorithms reduce the computatio...
详细信息
We explore the computational implications of a superposition of spacetimes, a phenomenon hypothesized in quantum gravity theories. This was initiated by Shmueli (2024) where the author introduced the complexity class ...
详细信息
Side-channel vulnerabilities pose an increasing threat to cryptographically protected devices. Consequently, it is crucial to observe information leakages through physical parameters such as power consumption and elec...
详细信息
In this paper, we give efficient algorithms for solving the Diophantine equation f(x, y) = m for arbitrary definite binary quadratic form f, given the factorization of m. While Cornacchia’s algorithm to solve x2 + dy...
详细信息
Cryptographic primitives have been used for various non-cryptographic objectives, such as eliminating or reducing randomness and interaction. We show how to use cryptography to improve the time complexity of solving c...
详细信息
Chaos can be thought of as a superset of pseudo random number generators employed as a part of standard encryption algorithms and is a noteworthy and fundamental consequence of nonlinear dynamics. The important estima...
详细信息
ISBN:
(纸本)9781912764112
Chaos can be thought of as a superset of pseudo random number generators employed as a part of standard encryption algorithms and is a noteworthy and fundamental consequence of nonlinear dynamics. The important estimation of disarray is the capacity to create a wide range of different pseudo random number generating algorithms. While there are, on a fundamental level, a boundless number of chaos based algorithms that can be designed, they generally depend on the utilization of floating point arithmetic and require high precision floating point computations to produce sensibly extensive cycles. These floating point schemes are computationally intensive given that the number streams they create are generally changed into bit streams. In this context, this paper audits encryption methodologies in view of floating point algorithms.
Blockchain introduces challenges related to the reliability of user identity and identity management systems;this includes detecting unfalsified identities linked to IoT applications. This study focuses on optimizing ...
详细信息
Blockchain introduces challenges related to the reliability of user identity and identity management systems;this includes detecting unfalsified identities linked to IoT applications. This study focuses on optimizing user identity verification time by employing an efficient encryption algorithm for the user signature in a peer-to-peer decentralized IoT blockchain network. To achieve this, a user signature-based identity management framework is examined by using various encryption techniques and contrasting various hash functions built on top of the Modified Merkle Hash Tree (MMHT) data structure algorithm. The paper presents the execution of varying dataset sizes based on transactions between nodes to test the scalability of the proposed design for secure blockchain communication. The results show that the MMHT data structure algorithm using SHA3 and AES-128 encryption algorithm gives the lowest execution time, offering a minimum of 36% gain in time optimization compared to other algorithms. This work shows that using the AES-128 encryption algorithm with the MMHT algorithm and SHA3 hash function not only identifies malicious codes but also improves user integrity check performance in a blockchain network, while ensuring network scalability. Therefore, this study presents the performance evaluation of a blockchain network considering its distinct types, properties, components, and algorithms' taxonomy.
暂无评论