Results 211 to 220 of about 379,633 (259)
Some of the next articles are maybe not open access.

Private-Key Fully Homomorphic Encryption for Private Classification

2018
Fully homomophic encryption enables private computation over sensitive data, such as medical data, via potentially quantum-safe primitives. In this extended abstract we provide an overview of an implementation of a private-key fully homomorphic encryption scheme in a protocol for private Naive Bayes classification.
Alexander Wood   +4 more
openaire   +1 more source

Private-Key Encryption

2012
In this chapter we introduce the basic ideas and concepts underlying private-key encryption (also called symmetric encryption). Particularly important is the concept of security, which for the classical ciphers studied in the first chapter was not precisely defined.
openaire   +1 more source

Key role for private health sector

Nursing Standard, 1988
The private health care sector has a key role to play in caring for elderly people, the Commons Select Committee on Social Services has been told.
openaire   +2 more sources

Private-Key Hidden Vector Encryption with Key Confidentiality

2009
Predicate encryption is an important cryptographic primitive that has been recently studied [BDOP04, BW07, GPSW06, KSW08] and that has found wide applications. Roughly speaking, in a predicate encryption scheme the owner of the master secret key K can derive secret key $\tilde K$, for any pattern vector k .
BLUNDO, Carlo   +2 more
openaire   +2 more sources

A Private Key Management Scheme

2009 WASE International Conference on Information Engineering, 2009
A safety private key management scheme ispresent in this paper. It uses an online assistantserver to cooperates with user device to performprivate key operation. And a light-weightbidirectional authentication is used beforepublic key algorithm that can avoid Denial ofService attack. Our scheme was more suitablefor private key operation in frequency.
Huming Gao, Xin Lv
openaire   +1 more source

Circuit-Private Multi-key FHE

2017
Multi-key fully homomorphic encryption MFHE schemes allow polynomially many users without trusted setup assumptions to send their data encrypted under different FHE keys chosen by users independently of each other to an honest-but-curious server that can compute the output of an arbitrary polynomial-time computable function on this joint data and issue
Wutichai Chongchitmate, Rafail Ostrovsky
openaire   +1 more source

Public and Private Key Cryptography

2021
Please download the sample Excel files from https://github.com/hhohho/master-Excel-through-projects for this chapter’s exercises.
openaire   +1 more source

Asymmetric Encryption: Public/Private Keys

2019
Asymmetric encryption is one of the most important advances in cryptographic security ever made. It underpins all of the security on the Web, in your Wi-Fi connections, and in secure email and other communication of all kinds. It is ubiquitous, but it is also subtle and easy to implement or use incorrectly, and a lack of correctness means a sometimes ...
Seth James Nielson   +1 more
openaire   +1 more source

Encoding Private Key in Fingerprint

2005
Electronic transactions require secure electronic signature techniques, which can provide the authentication of the signing individual, non-repudiation of the signature and protection of the integrity of the document using strong cryptographic methods.
Ernő Jeges   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy