You are currently viewing a new version of our website. To view the old version click .

Cryptography, Volume 9, Issue 1

March 2025 - 20 articles

Cover Story: Fully Homomorphic Encryption (FHE) represents a revolutionary advancement in cryptography, enabling computations on encrypted data without prior decryption. This paper examines the Gentry–Sahai–Waters (GSW) FHE scheme, addressing two critical limitations: restricted message data ranges and excessive ciphertext size. We propose significant improvements through Chinese Remainder Theorem-based message decomposition, expanding input ranges to the entire plaintext space. Additionally, we implement an intuitive approximation method for decryption and adapt PVW-like compression techniques to reduce memory overhead. These enhancements make the GSW scheme more practical and efficient for real-world secure computation applications, overcoming key barriers to widespread FHE adoption in privacy-preserving data processing environments. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (20)

  • Article
  • Open Access
1 Citations
1,360 Views
27 Pages

Popular technologies such as blockchain and zero-knowledge proof, which have already entered the enterprise space, heavily use cryptography as the core of their protocol stack. One of the most used systems in this regard is Elliptic Curve Cryptograph...

  • Article
  • Open Access
2,736 Views
18 Pages

CRYSTALS-Kyber has been standardized as a general public-key post-quantum algorithm under the name of ML-KEM after NIST released its first three final post-quantum standards in August 2024. The resilience of post-quantum cryptography to side-channel...

  • Article
  • Open Access
956 Views
22 Pages

Authenticated encryption with associated data (AEAD) schemes based on stream ciphers, such as ASCON and MORUS, typically use nonlinear feedback shift registers (NFSRs) and linear feedback shift registers (LFSRs) to generate variable-length key stream...

  • Review
  • Open Access
5 Citations
6,062 Views
16 Pages

With the rise in applications of artificial intelligence (AI) across various sectors, security concerns have become paramount. Traditional AI systems often lack robust security measures, making them vulnerable to adversarial attacks, data breaches, a...

  • Feature Paper
  • Article
  • Open Access
1,394 Views
26 Pages

The formal study of computer malware was initiated in the seminal work of Fred Cohen in the mid-80s, who applied elements of Computation Theory in the investigation of the theoretical limits of using the Turing Machine formal model of computation in...

  • Article
  • Open Access
1,479 Views
18 Pages

Field-programmable gate arrays (FPGAs) are widely used in cloud servers as an acceleration solution for compute-intensive tasks. Cloud FPGAs are typically multi-tenant, enabling resource sharing among multiple users but are vulnerable to power side-c...

  • Article
  • Open Access
2 Citations
1,229 Views
28 Pages

This paper explores advancements in the Gentry-Sahai-Waters (GSW) fully homomorphic encryption scheme (FHE), addressing challenges related to message data range limitations and ciphertext size constraints. We leverage the well-known parallelizing tec...

  • Article
  • Open Access
1,665 Views
20 Pages

Private information retrieval (PIR) enables a client to retrieve a specific element from a server’s database without disclosing the index that was queried. This work introduces three improvements to the efficient single-server PIR protocol Spir...

  • Article
  • Open Access
1,468 Views
42 Pages

DGMT: A Fully Dynamic Group Signature from Symmetric-Key Primitives

  • Mojtaba Fadavi,
  • Sabyasachi Karati,
  • Aylar Erfanian and
  • Reihaneh Safavi-Naini

A group signature scheme allows a user to sign a message anonymously on behalf of a group and provides accountability by using an opening authority who can “open” a signature and reveal the signer’s identity. Group signature schemes...

  • Article
  • Open Access
2 Citations
2,079 Views
14 Pages

Design and Implementation of a Quantum-Assisted Digital Signature

  • Marta Irene García-Cid,
  • Rodrigo Martín,
  • David Domingo,
  • Vicente Martín and
  • Laura Ortiz

We propose a new quantum-assisted digital signature (Q-DS) protocol based on the composite of truly random symmetric keys generated by quantum key distribution with secure standardized hash functions, which allows for high parameterization to provide...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387XCreative Common CC BY license