Results 11 to 20 of about 124,824 (277)

Certificateless Searchable Encryption Scheme in Multi-User Environment

open access: yesCryptography, 2022
Searchable encryption technology enables users to access data that has been made publicly encrypted without divulging the original content. The majority of the currently available multi-user certificateless searchable encryption technologies are based on
Tao Feng, Jiewen Si
doaj   +1 more source

Research on the searchable encryption

open access: yes网络与信息安全学报, 2016
Searchable encryption has been recognized as a promising method to achieve the secure cloud search.According to the types of encryption keys,searchable encryption can be divided into searchable public-key and symmetric-key encryptions.The existing and ...
Peng XU, Hai JIN
doaj   +3 more sources

An Efficient Public-Key Dual-Receiver Encryption Scheme

open access: yesIEEE Access, 2022
Public-key dual-receiver encryption (PK-DRE) is a kind of particular public-key encryption for enabling two independent recipients to obtain the same plaintext from the same ciphertext.
Chenglong Gao   +3 more
doaj   +1 more source

New leakage-resilient CCA-secure public key encryption

open access: yesJournal of Mathematical Cryptology, 2013
This paper shows a generic method of constructing CCA-secure public key encryption schemes with leakage-resilience on the secret key. It is based on a new kind of universal2 hash proof system which accepts an auxiliary parameter.
Kurosawa Kaoru   +2 more
doaj   +1 more source

Incremental Deterministic Public-Key Encryption [PDF]

open access: yesJournal of Cryptology, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Mironov, Ilya   +3 more
openaire   +2 more sources

A New Technique in Rank Metric Code-Based Encryption

open access: yesCryptography, 2018
We propose a rank metric codes based encryption based on the hard problem of rank syndrome decoding problem. We propose a new encryption with a public key matrix by considering the adding of a random distortion matrix over F q m of full column ...
Terry Shue Chien Lau, Chik How Tan
doaj   +1 more source

Leveled Certificateless Fully Homomorphic Encryption Schemes From Learning With Errors

open access: yesIEEE Access, 2020
Fully homomorphic encryption (FHE) is a form of public-key encryption that allows the computation of arbitrary functions on encrypted data without decrypting the data. As a result, it is a useful tool with numerous applications.
Mingxiang Li
doaj   +1 more source

Survey on public key encryption with equality test

open access: yes网络与信息安全学报, 2018
As one of the important methods of solving the problem of computation over encrypted data under multiple public keys in cloud environment,public key encryption with equality test (PKEET) supports to check whether two ciphertexts encrypted under (possibly)
Yuanhao WANG,Hongbo LI,Yuzhao CUI,Qingwen GUO,Qiong HUANG
doaj   +3 more sources

Revisiting Shared Data Protection Against Key Exposure

open access: yes, 2020
This paper puts a new light on secure data storage inside distributed systems. Specifically, it revisits computational secret sharing in a situation where the encryption key is exposed to an attacker.
Bertoni Guido   +7 more
core   +3 more sources

Efficient public-key cryptography with bounded leakage and tamper resilience [PDF]

open access: yes, 2016
We revisit the question of constructing public-key encryption and signature schemes with security in the presence of bounded leakage and tampering memory attacks.
A Faonio   +46 more
core   +2 more sources

Home - About - Disclaimer - Privacy