Results 251 to 260 of about 16,729,036 (330)
Some of the next articles are maybe not open access.

Public key authenticated encryption with keyword search: revisited

IET Information Security, 2019
In 2017, the notion of public key authenticated encryption with keyword search (PAEKS) and its security model was defined by Huang and Li. Their main motivation was providing security against inside keyword guessing attacks (KGA).
Mahnaz Noroozi, Ziba Eslami
semanticscholar   +1 more source

Quantum Public-Key Cryptosystem

International Journal of Theoretical Physics, 2011
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Luo, Ming-Xing   +3 more
openaire   +1 more source

Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things

IEEE Transactions on Industrial Informatics, 2018
Industrial Internet of Things (IIoT) integrates various types of intelligent terminals, mobile devices, and communication technologies to enable the upgrade of traditional industries to intelligent industries.
De-biao He   +4 more
semanticscholar   +1 more source

Public Key Cryptography

AT&T Technical Journal, 1994
This article explains public key cryptography, its benefits and limitations.
openaire   +1 more source

On Splitting Public Keys for the Public Key Infrastructure

2005 IEEE International Conference on e-Technology, e-Commerce and e-Service, 2005
Certificates and the public key infrastructure (PKI) play an vital role in electronic commerce. The framework of splitting the public key in the PKI is presented in this paper. Aimed to enhance the security level from both the perspectives of certificate issuing and certificate revocation, the framework splits the public key into multiple parts, and ...
S. Cristiano, F.F. Liu
openaire   +1 more source

Coalition Public-Key Cryptosystems

Cybernetics and Systems Analysis, 2001
A coalition is understood to be a group of participants (coalitionists) who can collaborate in order to achieve common objectives. The basic principle of a coalition is the absence of a threat to communication flows within the coalition from its participants. In this paper, two new RSA coalition protocols are considered. According to the first protocol,
openaire   +1 more source

Public-Key Encryption

1999
Public-key algorithms use a secret element and a public element to their code. One of the main algorithms is RSA. Compared with DES it is relatively slow but it has the advantage that users can choose their own key whenever they need one. The most commonly used public-key cryptosystems are covered in the next sections.
openaire   +1 more source

Public Key Cryptography

2021
In this chapter we will discuss public-key cryptography(PKC) and it’s various applications and its probable use. Limitations and disadvantages of symmetric-key cryptography(private-key cryptography) motivates the extensive use of public-key cryptography. Well known limitations are: Key exchange is a major problem in symmetric key cryptography. you
Satyanarayana Vollala   +2 more
openaire   +1 more source

Public-Key Cryptography

Abstract The basic idea of public-key cryptography as a means for two untrusting parties to establish secure communication is outlined. The use of public-key cryptography to establish a key for a symmetric cryptosystem by using a protocol such as the Diffie-Hellman protocol or quantum key distribution (QKD) is explained. Two major public-
Eric L. F. Roettger, Hugh C. Williams
openaire   +2 more sources

Home - About - Disclaimer - Privacy