Results 11 to 20 of about 3,071,363 (328)
Forward-Security in Private-Key Cryptography [PDF]
This paper provides a comprehensive treatment of forward-security in the context of sharedkey based cryptographic primitives, as a practical means to mitigate the damage caused by key-exposure.
A. Desai+14 more
core +4 more sources
The private key capacity region for three terminals [PDF]
Appeared in the proceedings of the 2004 IEEE International Symposium on Information Theory, Chicago, Illinois, June 27 -- July 2 ...
Chunxuan Ye, Prakash Narayan
openalex +4 more sources
Quantum Key Distribution Protocol with Private-Public Key
A quantum cryptographic protocol based in public key cryptography combinations and private key cryptography is presented. Unlike the BB84 protocol [1] and its many variants [2,3] two quantum channels are used. The present research does not make reconciliation mechanisms of information to derive the key.
Eduin H Serna
openalex +4 more sources
Secret Key and Private Key Constructions for Simple Multiterminal Source Models [PDF]
We propose an approach for constructing secret and private keys based on the long-known Slepian-Wolf code, due to Wyner, for correlated sources connected by a virtual additive noise channel. Our work is motivated by results of Csisz r and Narayan which highlight innate connections between secrecy generation by multiple terminals that observe ...
Chunxuan Ye, Prakash Narayan
openalex +8 more sources
Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps
This research paper presents a novel digital color image encryption approach that ensures high-level security while remaining simple and efficient. The proposed method utilizes a composite key r and x of 128-bits to create a small in-dimension private ...
Mua’ad Abu-Faraj+6 more
doaj +1 more source
This paper introduces a novel approach to enhance the efficiency of compressing Arabic Unicode text using the Lempel-Ziv-Welch (LZW) technique. This method includes two stages: transformation and compression.
Enas Abu Jrai+4 more
doaj +1 more source
Function-Private Functional Encryption in the Private-Key Setting [PDF]
Functional encryption supports restricted decryption keys that allow users to learn specific functions of the encrypted messages. Although the vast majority of research on functional encryption has so far focused on the privacy of the encrypted messages, in many realistic scenarios it is crucial to offer privacy also for the functions for which ...
Brakerski, Zvika, Segev, Gil
openaire +3 more sources
Generalization of RSA cryptosystem based on 2n primes
This article introduced a new generalized RSA crypto-system based on $ 2n $ prime numbers called generalized RSA (GRSA). This is a modern technique to provide supreme security for the computer world by factoring the variable$ N $, where its analysis ...
Tariq Shah+4 more
doaj +1 more source
Service for Verification of Electronic Document’s Certificates
The legislation of the Republic of Belarus currently establishes the same legal force for identical documents on paper and in electronic form, which have a mandatory requisite - an electronic digital signature.
I. O. Tolokh+2 more
doaj +1 more source
Secure Secret Key and Private Key Generation in Source-Type Model With a Trusted Helper
Encrypting information with pre-agreed key is an effective method to ensure information security. With the increasing requirement for key rate, this paper investigates the problem of simultaneously generating a secret key (SK) and a private key (PK) over
Shixun Gong+4 more
doaj +1 more source