Results 11 to 20 of about 835,298 (263)

An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy

open access: yesSensors, 2022
The Internet of Things (IoT) strongly influences the world economy; this emphasizes the importance of securing all four aspects of the IoT model: sensors, networks, cloud, and applications.
Shuhab Shamshad   +4 more
doaj   +2 more sources

Multiple-Image Encryption Mechanism Based on Ghost Imaging and Public Key Cryptography

open access: yesIEEE Photonics Journal, 2019
On the basis of ghost imaging, this paper proposes a multiple-image encryption scheme combining public key cryptography and Hadamard basis pattern. In the encryption system, a plurality of light paths are set, and the Hadamard basis patterns are used for
Leihong Zhang   +3 more
doaj   +2 more sources

Public key cryptography [PDF]

open access: bronzeXRDS: Crossroads, The ACM Magazine for Students, 2000
P. Mohapatra
openaire   +3 more sources

Group ring cryptography: Cryptography, key exchange, public key [PDF]

open access: yesIntl. J. of Pure and Appl. Math., 93, no. 6, 897-927, 2014, 2013
General cryptographic schemes are presented where keys can be one-time or ephemeral. Processes for key exchange are derived. Public key cryptographic schemes based on the new systems are easily established. Authentication and signature schemes are implemented.
arxiv   +3 more sources

Quantum cryptography: Public key distribution and coin tossing [PDF]

open access: hybridTheoretical Computer Science, 2014
Charles H. Bennett, Gilles Brassard
openalex   +2 more sources

Certificateless Public Key Cryptography [PDF]

open access: yesInternational Conference on the Theory and Application of Cryptology and Information Security, 2003
This paper introduces and makes concrete the concept of certificateless public key cryptography (CL-PKC), a model for the use of public key cryptography which avoids the inherent escrow of identity-based cryptography and yet which does not require certificates to guarantee the authenticity of public keys. The lack of certificates and the presence of an
Kenneth G. Paterson, Sattam S. Al-Riyami
openaire   +3 more sources

Revocable identity‐based matchmaking encryption in the standard model

open access: yesIET Information Security, 2023
Identity‐based Matchmaking Encryption (IB‐ME) is an extension notion of matchmaking encryption (CRYPTO 2019), where a sender and a receiver can specify an access policy for the other party.
Zhe Jiang   +5 more
doaj   +1 more source

Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes

open access: yesIET Information Security, 2021
The concept of Proxy Re‐Encryption (PRE) was introduced by Blaze, Bleumer and Strauss at Eurocrypt in 1998. In this concept, a semi‐trusted proxy user acquires a re‐encryption key from the delegator.
Kunwar Singh   +3 more
doaj   +1 more source

On Multiple Encryption for Public-Key Cryptography

open access: yesCryptography, 2023
Using multiple, individual encryption schemes is a well-established method to increase the overall security of encrypted data. These so-called multiple encryption or hybrid schemes have regained traction in the context of public-key cryptography due to ...
Tudor Soroceanu   +2 more
doaj   +1 more source

Post-quantum cryptography-driven security framework for cloud computing

open access: yesOpen Computer Science, 2022
Data security in the cloud has been a major issue since the inception and adoption of cloud computing. Various frameworks have been proposed, and yet data breach prevails.
Ukwuoma Henry Chima   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy