Results 1 to 10 of about 535,614 (248)

Public key cryptography based on semigroup actions [PDF]

open access: hybrid, 2007
A generalization of the original Diffie-Hellman key exchange in $(\Z/p\Z)^*$ found a new depth when Miller and Koblitz suggested that such a protocol could be used with the group over an elliptic curve.
G. Mazé   +3 more
openalex   +4 more sources

Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes: Past and Present Status

open access: yesIEEE Access, 2021
The interconnected digital world is generating enormous data that must be secured from unauthorized access. Advancement in technologies and new innovative methods applied by attackers play an instrumental role in breaching data security.
Raza Imam   +3 more
doaj   +2 more sources

Survey on SAP and its application in public-key cryptography [PDF]

open access: hybridJournal of Mathematical Cryptology, 2020
The concept of the semigroup action problem (SAP) was first introduced by Monico in 2002. Monico explained in his paper that the discrete logarithm problem (DLP) can be generalized to SAP. After defining the action problem in a semigroup, the concept was
Goel Neha, Gupta Indivar, Dass B. K.
doaj   +2 more sources

Multiple-Image Encryption Mechanism Based on Ghost Imaging and Public Key Cryptography

open access: yesIEEE Photonics Journal, 2019
On the basis of ghost imaging, this paper proposes a multiple-image encryption scheme combining public key cryptography and Hadamard basis pattern. In the encryption system, a plurality of light paths are set, and the Hadamard basis patterns are used for
Leihong Zhang   +3 more
doaj   +2 more sources

Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles

open access: goldIEEE Access, 2019
The fast progression of the Internet of Vehicles (IoV) has resulted in a large number of vehicles connecting to networks. This leads to massive growth in the data collected from vehicles via IoV.
Rashad Elhabob   +3 more
openalex   +2 more sources

A Lightweight Certificateless Authenticated Key Agreement Scheme Based on Chebyshev Polynomials for the Internet of Drones [PDF]

open access: yesSensors
The Internet of Drones (IoD) overcomes the physical limitations of traditional ground networks with its dynamic topology and 3D spatial flexibility, playing a crucial role in various fields.
Zhaobin Li   +4 more
doaj   +2 more sources

Quantum computing and the security of public key cryptography

open access: goldFundamental Research, 2021
Kai Li, Pei-Gen Yan, Qing-Yu Cai
doaj   +2 more sources

Revocable identity‐based matchmaking encryption in the standard model

open access: yesIET Information Security, 2023
Identity‐based Matchmaking Encryption (IB‐ME) is an extension notion of matchmaking encryption (CRYPTO 2019), where a sender and a receiver can specify an access policy for the other party.
Zhe Jiang   +5 more
doaj   +1 more source

Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes

open access: yesIET Information Security, 2021
The concept of Proxy Re‐Encryption (PRE) was introduced by Blaze, Bleumer and Strauss at Eurocrypt in 1998. In this concept, a semi‐trusted proxy user acquires a re‐encryption key from the delegator.
Kunwar Singh   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy