Results 1 to 10 of about 535,614 (248)
Public key cryptography based on semigroup actions [PDF]
A generalization of the original Diffie-Hellman key exchange in $(\Z/p\Z)^*$ found a new depth when Miller and Koblitz suggested that such a protocol could be used with the group over an elliptic curve.
G. Mazé +3 more
openalex +4 more sources
The interconnected digital world is generating enormous data that must be secured from unauthorized access. Advancement in technologies and new innovative methods applied by attackers play an instrumental role in breaching data security.
Raza Imam +3 more
doaj +2 more sources
Survey on SAP and its application in public-key cryptography [PDF]
The concept of the semigroup action problem (SAP) was first introduced by Monico in 2002. Monico explained in his paper that the discrete logarithm problem (DLP) can be generalized to SAP. After defining the action problem in a semigroup, the concept was
Goel Neha, Gupta Indivar, Dass B. K.
doaj +2 more sources
Multiple-Image Encryption Mechanism Based on Ghost Imaging and Public Key Cryptography
On the basis of ghost imaging, this paper proposes a multiple-image encryption scheme combining public key cryptography and Hadamard basis pattern. In the encryption system, a plurality of light paths are set, and the Hadamard basis patterns are used for
Leihong Zhang +3 more
doaj +2 more sources
Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles
The fast progression of the Internet of Vehicles (IoV) has resulted in a large number of vehicles connecting to networks. This leads to massive growth in the data collected from vehicles via IoV.
Rashad Elhabob +3 more
openalex +2 more sources
A Lightweight Certificateless Authenticated Key Agreement Scheme Based on Chebyshev Polynomials for the Internet of Drones [PDF]
The Internet of Drones (IoD) overcomes the physical limitations of traditional ground networks with its dynamic topology and 3D spatial flexibility, playing a crucial role in various fields.
Zhaobin Li +4 more
doaj +2 more sources
Quantum computing and the security of public key cryptography
Kai Li, Pei-Gen Yan, Qing-Yu Cai
doaj +2 more sources
Revocable identity‐based matchmaking encryption in the standard model
Identity‐based Matchmaking Encryption (IB‐ME) is an extension notion of matchmaking encryption (CRYPTO 2019), where a sender and a receiver can specify an access policy for the other party.
Zhe Jiang +5 more
doaj +1 more source
Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
The concept of Proxy Re‐Encryption (PRE) was introduced by Blaze, Bleumer and Strauss at Eurocrypt in 1998. In this concept, a semi‐trusted proxy user acquires a re‐encryption key from the delegator.
Kunwar Singh +3 more
doaj +1 more source

