Results 11 to 20 of about 13,982 (300)

Traceable Scheme of Public Key Encryption with Equality Test [PDF]

open access: yesEntropy, 2022
Public key encryption supporting equality test (PKEwET) schemes, because of their special function, have good applications in many fields, such as in cloud computing services, blockchain, and the Internet of Things.
Huijun Zhu   +3 more
doaj   +2 more sources

New leakage-resilient CCA-secure public key encryption

open access: yesJournal of Mathematical Cryptology, 2013
This paper shows a generic method of constructing CCA-secure public key encryption schemes with leakage-resilience on the secret key. It is based on a new kind of universal2 hash proof system which accepts an auxiliary parameter.
Kurosawa Kaoru   +2 more
doaj   +1 more source

Incremental Deterministic Public-Key Encryption [PDF]

open access: yesJournal of Cryptology, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Mironov, Ilya   +3 more
openaire   +2 more sources

A New Technique in Rank Metric Code-Based Encryption

open access: yesCryptography, 2018
We propose a rank metric codes based encryption based on the hard problem of rank syndrome decoding problem. We propose a new encryption with a public key matrix by considering the adding of a random distortion matrix over F q m of full column ...
Terry Shue Chien Lau, Chik How Tan
doaj   +1 more source

Leveled Certificateless Fully Homomorphic Encryption Schemes From Learning With Errors

open access: yesIEEE Access, 2020
Fully homomorphic encryption (FHE) is a form of public-key encryption that allows the computation of arbitrary functions on encrypted data without decrypting the data. As a result, it is a useful tool with numerous applications.
Mingxiang Li
doaj   +1 more source

Survey on public key encryption with equality test

open access: yes网络与信息安全学报, 2018
As one of the important methods of solving the problem of computation over encrypted data under multiple public keys in cloud environment,public key encryption with equality test (PKEET) supports to check whether two ciphertexts encrypted under (possibly)
Yuanhao WANG,Hongbo LI,Yuzhao CUI,Qingwen GUO,Qiong HUANG
doaj   +3 more sources

Decryption speed up of ElGamal with composite modulus.

open access: yesPLoS ONE, 2020
Public key cryptosystems such as RSA, rebalanced RSA and ElGamal have the disadvantage of serious asymmetry between encryption and decryption speed.
GyuChol Kim, SuChol Li
doaj   +1 more source

CCA-Secure Deterministic Identity-Based Encryption Scheme [PDF]

open access: yesJournal of Universal Computer Science, 2019
Deterministic public-key encryption, encrypting a plaintext into a unique ciphertext without involving any randomness, was introduced by Bellare, Boldyreva, and O'Neill (CRYPTO 2007) as a realistic alternative to some inherent drawbacks in randomized ...
Meijuan Huang   +5 more
doaj   +3 more sources

Provably sender-deniable encryption scheme [PDF]

open access: yesComputer Science Journal of Moldova, 2015
The use of the well known provably secure public-key cryptoscheme by Rabin is extended for the case of the deniable encryption. In the proposed new sender-deniable encryption scheme the cryptogram is computed as coefficients of quadratic congruence, the
N.A. Moldovyan   +2 more
doaj  

A Practical Public Key Encryption Scheme Based on Learning Parity With Noise

open access: yesIEEE Access, 2018
To protect cyber security and privacy, it is critical to design security and practical public key encryption schemes. Today, big data and cloud computing bring not only unprecedented opportunities but also fundamental security challenges.
Zhimin Yu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy