Results 1 to 10 of about 6,250 (191)
Survey on SAP and its application in public-key cryptography [PDF]
The concept of the semigroup action problem (SAP) was first introduced by Monico in 2002. Monico explained in his paper that the discrete logarithm problem (DLP) can be generalized to SAP. After defining the action problem in a semigroup, the concept was
Goel Neha, Gupta Indivar, Dass B. K.
doaj +2 more sources
A Lightweight Certificateless Authenticated Key Agreement Scheme Based on Chebyshev Polynomials for the Internet of Drones [PDF]
The Internet of Drones (IoD) overcomes the physical limitations of traditional ground networks with its dynamic topology and 3D spatial flexibility, playing a crucial role in various fields.
Zhaobin Li +4 more
doaj +2 more sources
Quantum computing and the security of public key cryptography
Kai Li, Pei-Gen Yan, Qing-Yu Cai
doaj +2 more sources
Revocable identity‐based matchmaking encryption in the standard model
Identity‐based Matchmaking Encryption (IB‐ME) is an extension notion of matchmaking encryption (CRYPTO 2019), where a sender and a receiver can specify an access policy for the other party.
Zhe Jiang +5 more
doaj +1 more source
Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
The concept of Proxy Re‐Encryption (PRE) was introduced by Blaze, Bleumer and Strauss at Eurocrypt in 1998. In this concept, a semi‐trusted proxy user acquires a re‐encryption key from the delegator.
Kunwar Singh +3 more
doaj +1 more source
On Multiple Encryption for Public-Key Cryptography
Using multiple, individual encryption schemes is a well-established method to increase the overall security of encrypted data. These so-called multiple encryption or hybrid schemes have regained traction in the context of public-key cryptography due to ...
Tudor Soroceanu +2 more
doaj +1 more source
Post-quantum cryptography-driven security framework for cloud computing
Data security in the cloud has been a major issue since the inception and adoption of cloud computing. Various frameworks have been proposed, and yet data breach prevails.
Ukwuoma Henry Chima +3 more
doaj +1 more source
Lattice‐based cryptosystems in standardisation processes: A survey
The current widely used public‐key cryptosystems are vulnerable to quantum attacks. To prepare for cybersecurity in the quantum era, some projects have been launched to call for post‐quantum alternatives.
Anyu Wang, Dianyan Xiao, Yang Yu
doaj +1 more source
Public-Key Cryptography Based on Tropical Circular Matrices
Some public-key cryptosystems based on the tropical semiring have been proposed in recent years because of their increased efficiency, since the multiplication is actually an ordinary addition of numbers and there is no ordinary multiplication of numbers
Huawei Huang, Chunhua Li, Lunzhi Deng
doaj +1 more source

