Results 1 to 10 of about 2,820 (132)

Triple receiver public key encryption cryptosystem

open access: green网络与信息安全学报, 2020
A triple receiver public key cryptosystem was proposed. In the cryptosystem, a sender encrypted a message and sent to three receivers, while the three receivers were able to decrypt the message with their own private keys.
ZHAO Liutao, WANG Caiqun   +2 more
doaj   +4 more sources

Public-Key Encryption With Keyword Search via Obfuscation [PDF]

open access: goldIEEE Access, 2019
Public-key encryption with keyword search (PEKS) enables users to search on encrypted data, which is applicable to the scenario of sharing data in the cloud storage. In this paper, we focus on how to construct a PEKS scheme via obfuscation.
Chengyu Hu   +3 more
doaj   +2 more sources

Pairing-Free for Public Key Encryption With Equality Test Scheme [PDF]

open access: goldIEEE Access, 2021
The modular exponentiation has been proved better in terms of computational efficiency as compared to bilinear pairing. Therefore, discrete logarithm, a concept of modular exponentiation may be incorporated to present improved security schemes. With this
Huijun Zhu   +3 more
doaj   +2 more sources

On Multiple Encryption for Public-Key Cryptography

open access: yesCryptography, 2023
Using multiple, individual encryption schemes is a well-established method to increase the overall security of encrypted data. These so-called multiple encryption or hybrid schemes have regained traction in the context of public-key cryptography due to ...
Tudor Soroceanu   +2 more
doaj   +1 more source

Public-Key Encryption Secure Against Related Randomness Attacks for Improved End-to-End Security of Cloud/Edge Computing

open access: yesIEEE Access, 2020
Public-key encryption is often used to protect data security/privacy and secure communication in scenarios of cloud computing and edge computing. Related randomness attacks model (RRA) for public-key encryption was motivated by randomness failures.
Pengtao Liu
doaj   +1 more source

An Integer Fully Homomorphic Encryption Scheme with Shorter Public Key Size [PDF]

open access: yesJisuanji gongcheng, 2018
Aiming at the problem that the efficiency of the integer Fully Homomorphic Encryption(FHE) scheme is low and the public key is long,Coron’s public key compression technique is used to encryption algorithm with a quadratic form,a partial homomorphic ...
SUN Nigang,ZHU Haoran,CHEN Xuanren
doaj   +1 more source

ELLIPTIC CURVES PUBLIC KEY TRAITOR TRACING SCHEME [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2008
In this paper we use the elliptic curves system in the Public Key Traitor Tracing Scheme. The Elliptic Curve points form Abelian group that used in the Public Key Traitor Tracing Scheme.
Ali M. Sagheer
doaj   +1 more source

Certificateless Searchable Encryption Scheme in Multi-User Environment

open access: yesCryptography, 2022
Searchable encryption technology enables users to access data that has been made publicly encrypted without divulging the original content. The majority of the currently available multi-user certificateless searchable encryption technologies are based on
Tao Feng, Jiewen Si
doaj   +1 more source

Research on the searchable encryption

open access: yes网络与信息安全学报, 2016
Searchable encryption has been recognized as a promising method to achieve the secure cloud search.According to the types of encryption keys,searchable encryption can be divided into searchable public-key and symmetric-key encryptions.The existing and ...
Peng XU, Hai JIN
doaj   +3 more sources

An Efficient Public-Key Dual-Receiver Encryption Scheme

open access: yesIEEE Access, 2022
Public-key dual-receiver encryption (PK-DRE) is a kind of particular public-key encryption for enabling two independent recipients to obtain the same plaintext from the same ciphertext.
Chenglong Gao   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy