2019
DOI: 10.1186/s13673-019-0193-6
|View full text |Cite
|
Sign up to set email alerts
|

An IND-CCA2 secure post-quantum encryption scheme and a secure cloud storage use case

Abstract: Code-based public key encryption (PKE) is a popular choice to achieve post-quantum security, partly due to its capability to achieve fast encryption/decryption. However, code-based PKE has larger ciphertext and public key sizes in comparison to conventional PKE schemes (e.g., those based on RSA). In 2018, Lau and Tan proposed a new rank metric code-based PKE scheme, which has smaller public key and ciphertext sizes compared to other code-based PKE schemes. They also proved that their scheme achieves IND-CPA se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 24 publications
0
1
0
1
Order By: Relevance
“…As the government and the political process become more transparent, participatory, online, and multimedia-rich, there is an excellent opportunity to adopt advanced AI and intelligent systems research in e-government and politics 2.0 applications [26]. E-Government Digital transformation transforms the government because it digitizes public services.…”
Section: E-government and Cyber Mis Applicationsmentioning
confidence: 99%
“…As the government and the political process become more transparent, participatory, online, and multimedia-rich, there is an excellent opportunity to adopt advanced AI and intelligent systems research in e-government and politics 2.0 applications [26]. E-Government Digital transformation transforms the government because it digitizes public services.…”
Section: E-government and Cyber Mis Applicationsmentioning
confidence: 99%
“…Günümüzde kullanılan kriptografik şemaların çoğu, Shor'un kuantum saldırı algoritmasına karşı dayanıklı olmayan sayı teorisine dayanmaktadır [70]. Shor (1994), geliştirdiği algoritma sayesinde ayrık algoritma ve hesaplanması zor problemler kuantum bilgisayarlar sayesinde polinom zamanda çözülebilmektedir.…”
Section: Kuantum Sonrasi Si̇ber Güvenli̇k (Cyber Security After Quantum)unclassified