Results 11 to 20 of about 6,586,318 (243)
Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing
Chen et al. indicated the inner keyword guessing attack coming from the low entropy of keywords, which eliminates the semantic security of most keyword search schemes.
Raylin Tso +4 more
doaj +1 more source
Public-Key Encryption with Delegated Search [PDF]
In public-key setting, Alice encrypts email with public key of Bob, so that only Bob will be able to learn contents of email. Consider scenario when computer of Alice is infected and unbeknown to Alice it also embeds malware into message.
Hartel, Pieter +3 more
core +3 more sources
Service for Verification of Electronic Document’s Certificates
The legislation of the Republic of Belarus currently establishes the same legal force for identical documents on paper and in electronic form, which have a mandatory requisite - an electronic digital signature.
I. O. Tolokh +2 more
doaj +1 more source
Blockchain technologies (BC) are immutable distributed systems of digital ledgers (i.e., without central repository) and, as rule, without central authority. Currently, there is a lot of excitement around the use of BC technology, although the technology
Vladimir I. Budzko, Dmitry A. Melnikov
doaj +1 more source
A practical digital signature scheme based on the hidden logarithm problem [PDF]
A candidate for practical post-quantum digital signature algorithm based on computational difficulty of the hidden discrete logarithm problem is introduced.
D.N. Moldovyan
doaj
We performed a sanity check of public keys collected on the web and found that the vast majority works as intended. Our main goal was to test the validity of the assumption that different random choices are made each time keys are generated. We found that this is not always the case, resulting in public keys that offer no security.
Arjen K. Lenstra +5 more
openaire +1 more source
Public Key Cryptography based on Semigroup Actions [PDF]
A generalization of the original Diffie-Hellman key exchange in $(\Z/p\Z)^*$ found a new depth when Miller and Koblitz suggested that such a protocol could be used with the group over an elliptic curve.
Maze, G., Monico, C., Rosenthal, J.
core +1 more source
Karatsuba-Ofman Multiplier with Integrated Modular Reduction for GF(2m)
In this paper a novel GF(2m) multiplier based on Karatsuba-Ofman Algorithm is presented. A binary field multiplication in polynomial basis is typically viewed as a two steps process, a polynomial multiplication followed by a modular reduction step ...
CUEVAS-FARFAN, E. +6 more
doaj +1 more source
Improved Homomorphic Discrete Fourier Transforms and FHE Bootstrapping
Homomorphic encryption (HE), which enables computation on ciphertexts without any leakage, rise as a most promising solution for privacy-preserving data processing, including secure machine learning and secure out-sourcing computation.
Kyoohyung Han +2 more
doaj +1 more source
Public Key Encryption with Secure Key Leasing
68 pages, 4 figures. added related works and a comparison with a concurrent work (2023-04-07)
Agrawal, Shweta +4 more
openaire +2 more sources

