Results 1 to 10 of about 20,257 (155)
Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography. [PDF]
Private information retrieval (PIR) is a database query protocol that provides user privacy, in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre.
Kon WY, Lim CCW.
europepmc +2 more sources
Provably secure identity-based identification and signature schemes from code assumptions. [PDF]
Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/
Bo Song, Yiming Zhao
doaj +2 more sources
Practical Provably Secure Multi-node Communication [PDF]
We present a practical and provably-secure multimode communication scheme in the presence of a passive eavesdropper. The scheme is based on a random scheduling approach that hides the identity of the transmitter from the eavesdropper.
Ali, Omar +2 more
core +2 more sources
We realised a provably-secure symmetric private information retrieval supported by a quantum-secure key-exchange network. Our demonstration achieves secure retrieval of 582-byte fingerprint files from a database with 800 entries.
Chao Wang +3 more
doaj +1 more source
The data breach and the integrity violation of remote data remain significant issues in the domain of information security. A provably-secure hash function aids in providing solutions to integrity-related issues.
P. Karthik +5 more
doaj +1 more source
Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification
We propose a new approach for building efficient, provably secure, and practically hardened implementations of masked algorithms. Our approach is based on a Domain Specific Language in which users can write efficient assembly implementations and fine ...
Gilles Barthe +5 more
doaj +1 more source
In the use of a cloud storage, sharing of data with efficient access control is an important requirement in addition to data security and privacy. Cui et al. (IEEE Trans. on Comp.
Masahiro Kamimura +3 more
doaj +1 more source
Provably Quantum-Secure Tweakable Block Ciphers
Recent results on quantum cryptanalysis show that some symmetric key schemes can be broken in polynomial time even if they are proven to be secure in the classical setting.
Akinori Hosoyamada, Tetsu Iwata
doaj +1 more source
Provably Secure Key Management Protocol for Heterogeneous WSN [PDF]
Authentication and key agreement protocol is the mainstream method to solve the secure communication of devices in wireless sensor networks.For the current mainstream secret key agreement protocol in wireless sensor networks,the scenario considered is ...
ZHANG Linghao, TANG Yong, DENG Dong, LIU Yangyang, TANG Chao, GUI Shenglin
doaj +1 more source
Internet of Things (IoT) is made up of various smart devices for the exchange of sensed data through online services. Direct contact with people through smart devices to define parameters for healthcare and send them to a centralized repository.
Chandrashekhar Meshram +7 more
doaj +1 more source

