Private Key and Decoder Side Information for Secure and Private Source Coding [PDF]
We extend the problem of secure source coding by considering a remote source whose noisy measurements are correlated random variables used for secure source reconstruction.
Onur Günlü +3 more
doaj +2 more sources
Secure Secret Key and Private Key Generation in Source-Type Model With a Trusted Helper [PDF]
Encrypting information with pre-agreed key is an effective method to ensure information security. With the increasing requirement for key rate, this paper investigates the problem of simultaneously generating a secret key (SK) and a private key (PK) over
Shixun Gong +4 more
doaj +2 more sources
Cooperative Jamming-Based Physical-Layer Group Secret and Private Key Generation [PDF]
This paper explores physical layer group key generation in wireless relay networks with a star topology. In this setup, the relay node plays the role of either a trusted or untrusted central node, while one legitimate node (Alice) acts as the reference ...
Shiming Fu, Tong Ling, Jun Yang, Yong Li
doaj +2 more sources
The Capacity Region of the Source-Type Model for Secret Key and Private Key Generation [PDF]
The problem of simultaneously generating a secret key (SK) and private key (PK) pair among three terminals via public discussion is investigated, in which each terminal observes a component of correlated sources.
Lai, Lifeng +3 more
core +3 more sources
A generic construction of quantum-oblivious-key-transfer-based private query with ideal database security and zero failure [PDF]
Higher security and lower failure probability have always been people’s pursuits in quantum-oblivious-key-transfer-based private query (QOKT-PQ) protocols since Jacobi et al. [Phys. Rev.
Chun‐Yan Wei +4 more
openalex +3 more sources
Small Private Key MQPKS on an Embedded Microprocessor [PDF]
Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources.
Hwajeong Seo +5 more
doaj +2 more sources
Function-Private Functional Encryption in the Private-Key Setting [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Brakerski, Zvika, Segev, Gil
openaire +2 more sources
Circulant Rainbow: A New Rainbow Variant With Shorter Private Key and Faster Signature Generation
Rainbow is one of the most important signature schemes in multivariate public key cryptography. It enjoys a strong security guarantee and is a promising signature scheme in Post-Quantum Cryptography. However, it suffers from large key size. In this paper,
Zhiniang Peng, Shaohua Tang
openalex +2 more sources
Key management scheme with private key self-healing ability in DTN
Because of the large delay of DTN network,node cannot receive broadcast updating private key messages in a timely manner,thus unable to update the private key for a certain time period.Aiming at this problem,an allowing private key self-healing ...
De-quan LI +3 more
doaj +4 more sources
Public-Private Partnerships: Interorganizational Design as Key Success Factor
Public-Private Partnership (PPP), as a current topic in theory and practice, has mostly been treated from the perspective of legislation and recognized by classical macroeconomic paradigm.
Mirjana Petković +2 more
doaj +2 more sources

