Results 1 to 10 of about 124,824 (277)

Traceable Scheme of Public Key Encryption with Equality Test [PDF]

open access: yesEntropy, 2022
Public key encryption supporting equality test (PKEwET) schemes, because of their special function, have good applications in many fields, such as in cloud computing services, blockchain, and the Internet of Things.
Huijun Zhu   +3 more
doaj   +2 more sources

Symmetric Public-Key Encryption [PDF]

open access: yes, 2007
Public-key encryption would seem to be inherently asymmetric. in that only messages sent to a user can be encrypted using his public key. We demonstrate that the use of interactive protocols for sending encrypted messages enables a symmetric use of public keys; we give cryptographic protocols for the following tasks: 1.
Galil, Zvi, Landau, Gad M., Yung, Moti
openaire   +5 more sources

Triple receiver public key encryption cryptosystem

open access: yes网络与信息安全学报, 2020
A triple receiver public key cryptosystem was proposed. In the cryptosystem, a sender encrypted a message and sent to three receivers, while the three receivers were able to decrypt the message with their own private keys.
ZHAO Liutao, WANG Caiqun   +2 more
doaj   +3 more sources

On Multiple Encryption for Public-Key Cryptography

open access: yesCryptography, 2023
Using multiple, individual encryption schemes is a well-established method to increase the overall security of encrypted data. These so-called multiple encryption or hybrid schemes have regained traction in the context of public-key cryptography due to ...
Tudor Soroceanu   +2 more
doaj   +1 more source

Public-Key Encryption Secure Against Related Randomness Attacks for Improved End-to-End Security of Cloud/Edge Computing

open access: yesIEEE Access, 2020
Public-key encryption is often used to protect data security/privacy and secure communication in scenarios of cloud computing and edge computing. Related randomness attacks model (RRA) for public-key encryption was motivated by randomness failures.
Pengtao Liu
doaj   +1 more source

An Integer Fully Homomorphic Encryption Scheme with Shorter Public Key Size [PDF]

open access: yesJisuanji gongcheng, 2018
Aiming at the problem that the efficiency of the integer Fully Homomorphic Encryption(FHE) scheme is low and the public key is long,Coron’s public key compression technique is used to encryption algorithm with a quadratic form,a partial homomorphic ...
SUN Nigang,ZHU Haoran,CHEN Xuanren
doaj   +1 more source

ELLIPTIC CURVES PUBLIC KEY TRAITOR TRACING SCHEME [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2008
In this paper we use the elliptic curves system in the Public Key Traitor Tracing Scheme. The Elliptic Curve points form Abelian group that used in the Public Key Traitor Tracing Scheme.
Ali M. Sagheer
doaj   +1 more source

Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption [PDF]

open access: yes, 2020
An affine determinant program ADP: {0,1}^n → {0,1} is specified by a tuple (A,B_1,...,B_n) of square matrices over F_q and a function Eval: F_q → {0,1}, and evaluated on x \in {0,1}^n by computing Eval(det(A + sum_{i \in [n]} x_i B_i)).
Bartusek, James   +5 more
core   +2 more sources

Public-Key Encryption with Delegated Search [PDF]

open access: yes, 2011
In public-key setting, Alice encrypts email with public key of Bob, so that only Bob will be able to learn contents of email. Consider scenario when computer of Alice is infected and unbeknown to Alice it also embeds malware into message.
Hartel, Pieter   +3 more
core   +3 more sources

Home - About - Disclaimer - Privacy