You are currently viewing a new version of our website. To view the old version click .

Cryptography, Volume 9, Issue 3

September 2025 - 13 articles

Cover Story: We enhance the multikey scenario in the Gentry–Sahai–Waters (GSW) fully homomorphic encryption scheme to improve its real-world applicability. By combining two existing GSW multikey techniques—one for distributed decryption and the other for reducing memory usage—we further integrate CRT decomposition and ciphertext compression to optimize performance. Simulations in federated learning and multiparty communication demonstrate the practical benefits of these approaches. Our work offers a more efficient and secure solution for distributed data processing, advancing the state of secure communication systems. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (13)

  • Article
  • Open Access
777 Views
39 Pages

Traceable ring signatures (TRSs) allow a signer to create a signature that maintains anonymity while enabling traceability if needed. It merges the characteristics of traditional ring signatures with the ability to trace signers, making it ideal for...

  • Article
  • Open Access
2 Citations
984 Views
16 Pages

Chaotic systems, governed by deterministic nonlinear equations yet exhibiting highly complex and unpredictable behaviors, have emerged as valuable tools at the intersection of mathematics, engineering, and information security. This paper presents a...

  • Article
  • Open Access
1 Citations
912 Views
28 Pages

A Face Image Encryption Scheme Based on Nonlinear Dynamics and RNA Cryptography

  • Xiyuan Cheng,
  • Tiancong Cheng,
  • Xinyu Yang,
  • Wenbin Cheng and
  • Yiting Lin

With the rapid development of big data and artificial intelligence, the problem of image privacy leakage has become increasingly prominent, especially for images containing sensitive information such as faces, which poses a higher security risk. In o...

  • Article
  • Open Access
1 Citations
889 Views
21 Pages

In several stream cipher designs, Boolean functions (BFs) play a crucial role as non-linear components, either serving as filtering functions or being used within the combining process. The overall strength of stream ciphers mainly depends on certain...

  • Article
  • Open Access
934 Views
29 Pages

This paper enhances the multikey scenario in the Gentry–Sahai–Waters (GSW) fully homomorphic encryption scheme to increase its real-world applicability. We integrate the advantages of two existing GSW multikey approaches: one enabling dis...

  • Article
  • Open Access
2 Citations
1,192 Views
25 Pages

This paper presents a comprehensive register transfer-level (RTL) fault injection study targeting the program counter (PC) of the LEON3 processor, a SPARC V8-compliant core widely used in safety-critical and radiation-prone embedded applications. Usi...

  • Article
  • Open Access
1,076 Views
24 Pages

Identity-based cryptography introduced by Shamir (Crypto’84) has seen many advances through the years. In the context of post-quantum identity-based schemes, most of the efficient designs are based on lattices. In this work, we propose an ident...

  • Article
  • Open Access
1 Citations
1,025 Views
24 Pages

Towards Empowering Stakeholders Through Decentralized Trust and Secure Livestock Data Sharing

  • Abdul Ghafoor,
  • Iraklis Symeonidis,
  • Anna Rydberg,
  • Cecilia Lindahl and
  • Abdul Qadus Abbasi

Cybersecurity represents a critical challenge for data-sharing platforms involving multiple stakeholders, particularly within complex and decentralized systems such as livestock supply chain networks. These systems demand novel approaches, robust sec...

  • Article
  • Open Access
1,148 Views
21 Pages

Modern x86 processors incorporate performance-enhancing features such as prefetching mechanisms, cache coherence protocols, and support for large memory pages (e.g., 2 MB huge pages). While these architectural innovations aim to reduce memory access...

  • Article
  • Open Access
1 Citations
1,289 Views
21 Pages

Over years of development in secure multi-party computation (MPC), many sophisticated functionalities have been made practical, and multi-dimensional operations occur more and more frequently in MPC protocols, especially in protocols involving datase...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X