Results 1 to 10 of about 20,257 (155)

Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography. [PDF]

open access: yesEntropy (Basel), 2020
Private information retrieval (PIR) is a database query protocol that provides user privacy, in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre.
Kon WY, Lim CCW.
europepmc   +2 more sources

Provably secure identity-based identification and signature schemes from code assumptions. [PDF]

open access: yesPLoS ONE, 2017
Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/
Bo Song, Yiming Zhao
doaj   +2 more sources

Practical Provably Secure Multi-node Communication [PDF]

open access: yes2014 International Conference on Computing, Networking and Communications (ICNC), 2013
We present a practical and provably-secure multimode communication scheme in the presence of a passive eavesdropper. The scheme is based on a random scheduling approach that hides the identity of the transmitter from the eavesdropper.
Ali, Omar   +2 more
core   +2 more sources

Experimental symmetric private information retrieval with measurement-device-independent quantum network

open access: yesLight: Science & Applications, 2022
We realised a provably-secure symmetric private information retrieval supported by a quantum-secure key-exchange network. Our demonstration achieves secure retrieval of 582-byte fingerprint files from a database with 800 entries.
Chao Wang   +3 more
doaj   +1 more source

A novel subset-based polynomial design for enhancing the security of short message-digest with inflated avalanche and random responses

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
The data breach and the integrity violation of remote data remain significant issues in the domain of information security. A provably-secure hash function aids in providing solutions to integrity-related issues.
P. Karthik   +5 more
doaj   +1 more source

Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
We propose a new approach for building efficient, provably secure, and practically hardened implementations of masked algorithms. Our approach is based on a Domain Specific Language in which users can write efficient assembly implementations and fine ...
Gilles Barthe   +5 more
doaj   +1 more source

Key-Aggregate Searchable Encryption, Revisited: Formal Foundations for Cloud Applications, and Their Implementation

open access: yesIEEE Access, 2020
In the use of a cloud storage, sharing of data with efficient access control is an important requirement in addition to data security and privacy. Cui et al. (IEEE Trans. on Comp.
Masahiro Kamimura   +3 more
doaj   +1 more source

Provably Quantum-Secure Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2021
Recent results on quantum cryptanalysis show that some symmetric key schemes can be broken in polynomial time even if they are proven to be secure in the classical setting.
Akinori Hosoyamada, Tetsu Iwata
doaj   +1 more source

Provably Secure Key Management Protocol for Heterogeneous WSN [PDF]

open access: yesJisuanji kexue, 2023
Authentication and key agreement protocol is the mainstream method to solve the secure communication of devices in wireless sensor networks.For the current mainstream secret key agreement protocol in wireless sensor networks,the scenario considered is ...
ZHANG Linghao, TANG Yong, DENG Dong, LIU Yangyang, TANG Chao, GUI Shenglin
doaj   +1 more source

A Provably Secure Lightweight Subtree-Based Short Signature Scheme With Fuzzy User Data Sharing for Human-Centered IoT

open access: yesIEEE Access, 2021
Internet of Things (IoT) is made up of various smart devices for the exchange of sensed data through online services. Direct contact with people through smart devices to define parameters for healthcare and send them to a centralized repository.
Chandrashekhar Meshram   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy