Results 1 to 10 of about 10,264,102 (368)

Private Key and Decoder Side Information for Secure and Private Source Coding [PDF]

open access: yesEntropy, 2022
We extend the problem of secure source coding by considering a remote source whose noisy measurements are correlated random variables used for secure source reconstruction.
Onur Günlü   +3 more
doaj   +2 more sources

Secure Secret Key and Private Key Generation in Source-Type Model With a Trusted Helper [PDF]

open access: goldIEEE Access, 2020
Encrypting information with pre-agreed key is an effective method to ensure information security. With the increasing requirement for key rate, this paper investigates the problem of simultaneously generating a secret key (SK) and a private key (PK) over
Shixun Gong   +4 more
doaj   +2 more sources

Cooperative Jamming-Based Physical-Layer Group Secret and Private Key Generation [PDF]

open access: yesEntropy
This paper explores physical layer group key generation in wireless relay networks with a star topology. In this setup, the relay node plays the role of either a trusted or untrusted central node, while one legitimate node (Alice) acts as the reference ...
Shiming Fu, Tong Ling, Jun Yang, Yong Li
doaj   +2 more sources

The Capacity Region of the Source-Type Model for Secret Key and Private Key Generation [PDF]

open access: yesIEEE Transactions on Information Theory, 2014
The problem of simultaneously generating a secret key (SK) and private key (PK) pair among three terminals via public discussion is investigated, in which each terminal observes a component of correlated sources.
Lai, Lifeng   +3 more
core   +3 more sources

A generic construction of quantum-oblivious-key-transfer-based private query with ideal database security and zero failure [PDF]

open access: greenIEEE transactions on computers, 2017
Higher security and lower failure probability have always been people’s pursuits in quantum-oblivious-key-transfer-based private query (QOKT-PQ) protocols since Jacobi et al. [Phys. Rev.
Chun‐Yan Wei   +4 more
openalex   +3 more sources

Small Private Key MQPKS on an Embedded Microprocessor [PDF]

open access: yesSensors, 2014
Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources.
Hwajeong Seo   +5 more
doaj   +2 more sources

Function-Private Functional Encryption in the Private-Key Setting [PDF]

open access: yesJournal of Cryptology, 2015
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Brakerski, Zvika, Segev, Gil
openaire   +2 more sources

Circulant Rainbow: A New Rainbow Variant With Shorter Private Key and Faster Signature Generation

open access: goldIEEE Access, 2017
Rainbow is one of the most important signature schemes in multivariate public key cryptography. It enjoys a strong security guarantee and is a promising signature scheme in Post-Quantum Cryptography. However, it suffers from large key size. In this paper,
Zhiniang Peng, Shaohua Tang
openalex   +2 more sources

Key management scheme with private key self-healing ability in DTN

open access: green网络与信息安全学报, 2017
Because of the large delay of DTN network,node cannot receive broadcast updating private key messages in a timely manner,thus unable to update the private key for a certain time period.Aiming at this problem,an allowing private key self-healing ...
De-quan LI   +3 more
doaj   +4 more sources

Public-Private Partnerships: Interorganizational Design as Key Success Factor

open access: diamondManagement, 2015
Public-Private Partnership (PPP), as a current topic in theory and practice, has mostly been treated from the perspective of legislation and recognized by classical macroeconomic paradigm.
Mirjana Petković   +2 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy