Results 1 to 10 of about 494,267 (189)

Probability theory and public-key cryptography [PDF]

open access: yesarXiv, 2020
In this short note, we address a common misconception at the interface of probability theory and public-key cryptography.
Bessonov, Mariya   +2 more
arxiv   +4 more sources

Multiple-Image Encryption Mechanism Based on Ghost Imaging and Public Key Cryptography

open access: yesIEEE Photonics Journal, 2019
On the basis of ghost imaging, this paper proposes a multiple-image encryption scheme combining public key cryptography and Hadamard basis pattern. In the encryption system, a plurality of light paths are set, and the Hadamard basis patterns are used for
Leihong Zhang   +3 more
doaj   +2 more sources

Breaking the Hidden Irreducible Polynomials Scheme [PDF]

open access: yesarXiv, 2019
In 2019 G\'omez described a new public key cryptography scheme based on ideas from multivariate public key cryptography using hidden irreducible polynomials. We show that the scheme's design has a flaw which lets an attacker recover the private key directly from the public key.
Eder, Christian
arxiv   +4 more sources

Revocable identity‐based matchmaking encryption in the standard model

open access: yesIET Information Security, 2023
Identity‐based Matchmaking Encryption (IB‐ME) is an extension notion of matchmaking encryption (CRYPTO 2019), where a sender and a receiver can specify an access policy for the other party.
Zhe Jiang   +5 more
doaj   +1 more source

Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes

open access: yesIET Information Security, 2021
The concept of Proxy Re‐Encryption (PRE) was introduced by Blaze, Bleumer and Strauss at Eurocrypt in 1998. In this concept, a semi‐trusted proxy user acquires a re‐encryption key from the delegator.
Kunwar Singh   +3 more
doaj   +1 more source

On Multiple Encryption for Public-Key Cryptography

open access: yesCryptography, 2023
Using multiple, individual encryption schemes is a well-established method to increase the overall security of encrypted data. These so-called multiple encryption or hybrid schemes have regained traction in the context of public-key cryptography due to ...
Tudor Soroceanu   +2 more
doaj   +1 more source

Post-quantum cryptography-driven security framework for cloud computing

open access: yesOpen Computer Science, 2022
Data security in the cloud has been a major issue since the inception and adoption of cloud computing. Various frameworks have been proposed, and yet data breach prevails.
Ukwuoma Henry Chima   +3 more
doaj   +1 more source

Lattice‐based cryptosystems in standardisation processes: A survey

open access: yesIET Information Security, 2023
The current widely used public‐key cryptosystems are vulnerable to quantum attacks. To prepare for cybersecurity in the quantum era, some projects have been launched to call for post‐quantum alternatives.
Anyu Wang, Dianyan Xiao, Yang Yu
doaj   +1 more source

Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes: Past and Present Status

open access: yesIEEE Access, 2021
The interconnected digital world is generating enormous data that must be secured from unauthorized access. Advancement in technologies and new innovative methods applied by attackers play an instrumental role in breaching data security.
Raza Imam   +3 more
doaj   +1 more source

White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography

open access: yesIACR Cryptology ePrint Archive, 2020
. Unlike black-box cryptography, an adversary in a white-box security model has full access to the implementation of the cryptographic algorithm. Thus, white-box implementation of cryptographic algorithms is more practical. Nevertheless, in recent years,
Yudi Zhang   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy