Private Key and Decoder Side Information for Secure and Private Source Coding [PDF]
We extend the problem of secure source coding by considering a remote source whose noisy measurements are correlated random variables used for secure source reconstruction.
Onur Günlü +3 more
doaj +2 more sources
Secure Secret Key and Private Key Generation in Source-Type Model With a Trusted Helper [PDF]
Encrypting information with pre-agreed key is an effective method to ensure information security. With the increasing requirement for key rate, this paper investigates the problem of simultaneously generating a secret key (SK) and a private key (PK) over
Shixun Gong +4 more
doaj +2 more sources
Cooperative Jamming-Based Physical-Layer Group Secret and Private Key Generation [PDF]
This paper explores physical layer group key generation in wireless relay networks with a star topology. In this setup, the relay node plays the role of either a trusted or untrusted central node, while one legitimate node (Alice) acts as the reference ...
Shiming Fu, Tong Ling, Jun Yang, Yong Li
doaj +2 more sources
Small Private Key MQPKS on an Embedded Microprocessor [PDF]
Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources.
Hwajeong Seo +5 more
doaj +2 more sources
Reminisce: Blockchain Private Key Generation and Recovery Using Distinctive Pictures-Based Personal Memory [PDF]
As a future game-changer in various industries, cryptocurrency is attracting people’s attention. Cryptocurrency is issued on blockchain and managed through a blockchain wallet application.
Jungwon Seo +4 more
doaj +2 more sources
Key management scheme with private key self-healing ability in DTN
Because of the large delay of DTN network,node cannot receive broadcast updating private key messages in a timely manner,thus unable to update the private key for a certain time period.Aiming at this problem,an allowing private key self-healing ...
De-quan LI +3 more
doaj +4 more sources
Public-Private Partnerships: Interorganizational Design as Key Success Factor
Public-Private Partnership (PPP), as a current topic in theory and practice, has mostly been treated from the perspective of legislation and recognized by classical macroeconomic paradigm.
Mirjana Petković +2 more
doaj +2 more sources
Private Key Extension of Polly Cracker Cryptosystems [PDF]
In 1993 Koblitz and Fellows proposed a public key cryptosystem, Polly Cracker, based on the problem of solving multivariate systems of polynomial equations, which was soon generalized to a Dröbner basis formulation.
Nina Taslaman
doaj +1 more source
Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps
This research paper presents a novel digital color image encryption approach that ensures high-level security while remaining simple and efficient. The proposed method utilizes a composite key r and x of 128-bits to create a small in-dimension private ...
Mua’ad Abu-Faraj +6 more
doaj +1 more source
Blockchain Technology – Support for Collaborative Systems [PDF]
Blockchain technology is one of the most promising new technology, a new approach in data registration and distribution, and represents a new paradigm for how information is shared.
Gheorghe MATEI
doaj +1 more source

