Results 301 to 310 of about 10,264,102 (368)
Some of the next articles are maybe not open access.
Air Gapped Wallet Schemes and Private Key Leakage in Permissioned Blockchain Platforms
International Congress on Blockchain and Applications, 2019In this paper we consider the threat surface and security of air gapped wallet schemes for permissioned blockchains as preparation for a Markov based mathematical model, and quantify the risk associated with private key leakage.
A. Davenport, S. Shetty
semanticscholar +1 more source
Practical private-key fully homomorphic encryption in rings
Groups Complex. Cryptol., 2018We describe a practical fully homomorphic encryption (FHE) scheme based on homomorphisms between rings and show that it enables very efficient computation on encrypted data. Our encryption though is private-key; public information is only used to operate
A. Gribov +2 more
semanticscholar +1 more source
2003
Section 3.1 presents some classical ciphers for which both plaintext and cipher-text are characters or strings of characters. Section 3.2 covers the theory of modern cryptosystems and describes two early ciphers: Lucifer and DES. Section 3.3 presents five private-key block ciphers: FEAL, IDEA, RC6, Rijndael, and Serpent, of which the last three took ...
Josef Pieprzyk +2 more
openaire +1 more source
Section 3.1 presents some classical ciphers for which both plaintext and cipher-text are characters or strings of characters. Section 3.2 covers the theory of modern cryptosystems and describes two early ciphers: Lucifer and DES. Section 3.3 presents five private-key block ciphers: FEAL, IDEA, RC6, Rijndael, and Serpent, of which the last three took ...
Josef Pieprzyk +2 more
openaire +1 more source
Single Private-Key Generator Security Implies Multiple Private-Key Generators Security
2018This paper discusses the security of identity-based cryptography with multiple private-key generators (mPKG-IBC). Most mPKG-IBC schemes and protocols are statically secure where private-key generators (PKGs) cannot control a binding between a party and its PKG.
Atsushi Fujioka, Kazuki Yoneyama
openaire +1 more source
1999
Encryption techniques can use either public keys or secret keys. Secret-key encryption techniques use a secret key which is only known by the two communicating parities, as illustrated in Figure 18.1. This key can be fixed or can be passed from the two parties over a secure communications link (for example over the postal network or a leased line). The
openaire +1 more source
Encryption techniques can use either public keys or secret keys. Secret-key encryption techniques use a secret key which is only known by the two communicating parities, as illustrated in Figure 18.1. This key can be fixed or can be passed from the two parties over a secure communications link (for example over the postal network or a leased line). The
openaire +1 more source
Private-key algebraic-code encryptions
IEEE Transactions on Information Theory, 1989Summary: Public-key cryptosystems using very large distance algebraic codes were studied in the past. Private-key cryptosystems using simpler codes have also been the subject of a recent study. A new approach to the private- key cryptosystems is proposed which allows use of very simple codes of distance \(\leq 6\) and length of 250 bits or less.
Rao, T. R. N., Nam, Kil-Hyun
openaire +2 more sources
Private key and public key quantum cryptography
Summaries of Papers Presented at the Quantum Electronics and Laser Science Conference, 2003Summary form only given. Information has always been valuable, never more so than in recent decades, and throughout history people have turned to cryptography in an attempt to keep important information secret. Coherent manipulation of quantum states promises to rearrange the lists of possible and impossible cryptographic tasks.
openaire +1 more source
2012
In this chapter we introduce the basic ideas and concepts underlying private-key encryption (also called symmetric encryption). Particularly important is the concept of security, which for the classical ciphers studied in the first chapter was not precisely defined.
openaire +1 more source
In this chapter we introduce the basic ideas and concepts underlying private-key encryption (also called symmetric encryption). Particularly important is the concept of security, which for the classical ciphers studied in the first chapter was not precisely defined.
openaire +1 more source
Key role for private health sector
Nursing Standard, 1988The private health care sector has a key role to play in caring for elderly people, the Commons Select Committee on Social Services has been told.
openaire +2 more sources
Private-Key Hidden Vector Encryption with Key Confidentiality
2009Predicate encryption is an important cryptographic primitive that has been recently studied [BDOP04, BW07, GPSW06, KSW08] and that has found wide applications. Roughly speaking, in a predicate encryption scheme the owner of the master secret key K can derive secret key $\tilde K$, for any pattern vector k .
BLUNDO, Carlo +2 more
openaire +2 more sources

