Skip Content
You are currently on the new version of our website. Access the old version .

Cryptography, Volume 9, Issue 3

2025 September - 13 articles

Cover Story: We enhance the multikey scenario in the Gentry–Sahai–Waters (GSW) fully homomorphic encryption scheme to improve its real-world applicability. By combining two existing GSW multikey techniques—one for distributed decryption and the other for reducing memory usage—we further integrate CRT decomposition and ciphertext compression to optimize performance. Simulations in federated learning and multiparty communication demonstrate the practical benefits of these approaches. Our work offers a more efficient and secure solution for distributed data processing, advancing the state of secure communication systems. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (13)

  • Article
  • Open Access
1,082 Views
39 Pages

Traceable ring signatures (TRSs) allow a signer to create a signature that maintains anonymity while enabling traceability if needed. It merges the characteristics of traditional ring signatures with the ability to trace signers, making it ideal for...

  • Article
  • Open Access
4 Citations
1,337 Views
16 Pages

Chaotic systems, governed by deterministic nonlinear equations yet exhibiting highly complex and unpredictable behaviors, have emerged as valuable tools at the intersection of mathematics, engineering, and information security. This paper presents a...

  • Article
  • Open Access
1 Citations
1,100 Views
28 Pages

A Face Image Encryption Scheme Based on Nonlinear Dynamics and RNA Cryptography

  • Xiyuan Cheng,
  • Tiancong Cheng,
  • Xinyu Yang,
  • Wenbin Cheng and
  • Yiting Lin

With the rapid development of big data and artificial intelligence, the problem of image privacy leakage has become increasingly prominent, especially for images containing sensitive information such as faces, which poses a higher security risk. In o...

  • Article
  • Open Access
1 Citations
1,063 Views
21 Pages

In several stream cipher designs, Boolean functions (BFs) play a crucial role as non-linear components, either serving as filtering functions or being used within the combining process. The overall strength of stream ciphers mainly depends on certain...

  • Article
  • Open Access
1,043 Views
29 Pages

This paper enhances the multikey scenario in the Gentry–Sahai–Waters (GSW) fully homomorphic encryption scheme to increase its real-world applicability. We integrate the advantages of two existing GSW multikey approaches: one enabling dis...

  • Article
  • Open Access
2 Citations
1,479 Views
25 Pages

This paper presents a comprehensive register transfer-level (RTL) fault injection study targeting the program counter (PC) of the LEON3 processor, a SPARC V8-compliant core widely used in safety-critical and radiation-prone embedded applications. Usi...

  • Article
  • Open Access
1,334 Views
24 Pages

Identity-based cryptography introduced by Shamir (Crypto’84) has seen many advances through the years. In the context of post-quantum identity-based schemes, most of the efficient designs are based on lattices. In this work, we propose an ident...

  • Article
  • Open Access
1 Citations
1,244 Views
24 Pages

Towards Empowering Stakeholders Through Decentralized Trust and Secure Livestock Data Sharing

  • Abdul Ghafoor,
  • Iraklis Symeonidis,
  • Anna Rydberg,
  • Cecilia Lindahl and
  • Abdul Qadus Abbasi

Cybersecurity represents a critical challenge for data-sharing platforms involving multiple stakeholders, particularly within complex and decentralized systems such as livestock supply chain networks. These systems demand novel approaches, robust sec...

  • Article
  • Open Access
1,398 Views
21 Pages

Modern x86 processors incorporate performance-enhancing features such as prefetching mechanisms, cache coherence protocols, and support for large memory pages (e.g., 2 MB huge pages). While these architectural innovations aim to reduce memory access...

  • Article
  • Open Access
1 Citations
1,507 Views
21 Pages

Over years of development in secure multi-party computation (MPC), many sophisticated functionalities have been made practical, and multi-dimensional operations occur more and more frequently in MPC protocols, especially in protocols involving datase...

  • Article
  • Open Access
1,376 Views
31 Pages

Composable Privacy-Preserving Framework for Stakes-Based Online Peer-to-Peer Applications

  • Nikola Hristov-Kalamov,
  • Raúl Fernández-Ruiz,
  • Agustín Álvarez-Marquina,
  • Julio Guillén-García,
  • Roberto Gallardo-Cava and
  • Daniel Palacios-Alonso

As the demand for expansive back-end systems in online applications continues to grow, novel frameworks are necessitated to address the escalating operational demands, energy consumption, and associated costs. Traditional Client–Server models,...

  • Article
  • Open Access
1 Citations
1,564 Views
25 Pages

A dual watermark and DNA image encryption based on a chaotic map is proposed. Firstly, a new discrete chaotic map is proposed, and the dynamic characteristics are analyzed. Then, the hash value changes initial conditions, and the pseudo-random sequen...

  • Article
  • Open Access
1 Citations
1,872 Views
26 Pages

The Eye-Opening Arbiter-PUF FPGA Implementation with Auto Error Detection

  • Holger Mandry,
  • Julian Spiess,
  • Bjoern Driemeyer,
  • Joachim Becker and
  • Maurits Ortmanns

We present the first implementation of an FPGA-based PUF that leverages the usually contradictory requirements of stability and response time. Many state-of-the-art implementations of PUFs are either slow with a low error rate, like the ring oscillat...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X