Results 301 to 310 of about 10,264,102 (368)
Some of the next articles are maybe not open access.

Air Gapped Wallet Schemes and Private Key Leakage in Permissioned Blockchain Platforms

International Congress on Blockchain and Applications, 2019
In this paper we consider the threat surface and security of air gapped wallet schemes for permissioned blockchains as preparation for a Markov based mathematical model, and quantify the risk associated with private key leakage.
A. Davenport, S. Shetty
semanticscholar   +1 more source

Practical private-key fully homomorphic encryption in rings

Groups Complex. Cryptol., 2018
We describe a practical fully homomorphic encryption (FHE) scheme based on homomorphisms between rings and show that it enables very efficient computation on encrypted data. Our encryption though is private-key; public information is only used to operate
A. Gribov   +2 more
semanticscholar   +1 more source

Private-Key Cryptosystems

2003
Section 3.1 presents some classical ciphers for which both plaintext and cipher-text are characters or strings of characters. Section 3.2 covers the theory of modern cryptosystems and describes two early ciphers: Lucifer and DES. Section 3.3 presents five private-key block ciphers: FEAL, IDEA, RC6, Rijndael, and Serpent, of which the last three took ...
Josef Pieprzyk   +2 more
openaire   +1 more source

Single Private-Key Generator Security Implies Multiple Private-Key Generators Security

2018
This paper discusses the security of identity-based cryptography with multiple private-key generators (mPKG-IBC). Most mPKG-IBC schemes and protocols are statically secure where private-key generators (PKGs) cannot control a binding between a party and its PKG.
Atsushi Fujioka, Kazuki Yoneyama
openaire   +1 more source

Private-Key Encryption

1999
Encryption techniques can use either public keys or secret keys. Secret-key encryption techniques use a secret key which is only known by the two communicating parities, as illustrated in Figure 18.1. This key can be fixed or can be passed from the two parties over a secure communications link (for example over the postal network or a leased line). The
openaire   +1 more source

Private-key algebraic-code encryptions

IEEE Transactions on Information Theory, 1989
Summary: Public-key cryptosystems using very large distance algebraic codes were studied in the past. Private-key cryptosystems using simpler codes have also been the subject of a recent study. A new approach to the private- key cryptosystems is proposed which allows use of very simple codes of distance \(\leq 6\) and length of 250 bits or less.
Rao, T. R. N., Nam, Kil-Hyun
openaire   +2 more sources

Private key and public key quantum cryptography

Summaries of Papers Presented at the Quantum Electronics and Laser Science Conference, 2003
Summary form only given. Information has always been valuable, never more so than in recent decades, and throughout history people have turned to cryptography in an attempt to keep important information secret. Coherent manipulation of quantum states promises to rearrange the lists of possible and impossible cryptographic tasks.
openaire   +1 more source

Private-Key Encryption

2012
In this chapter we introduce the basic ideas and concepts underlying private-key encryption (also called symmetric encryption). Particularly important is the concept of security, which for the classical ciphers studied in the first chapter was not precisely defined.
openaire   +1 more source

Key role for private health sector

Nursing Standard, 1988
The private health care sector has a key role to play in caring for elderly people, the Commons Select Committee on Social Services has been told.
openaire   +2 more sources

Private-Key Hidden Vector Encryption with Key Confidentiality

2009
Predicate encryption is an important cryptographic primitive that has been recently studied [BDOP04, BW07, GPSW06, KSW08] and that has found wide applications. Roughly speaking, in a predicate encryption scheme the owner of the master secret key K can derive secret key $\tilde K$, for any pattern vector k .
BLUNDO, Carlo   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy