Results 21 to 30 of about 405,500 (194)
The performance analysis of public key cryptography-based authentication
Several Kerberos-based authentication techniques using public-key cryptography have been proposed. Public-key cryptography can be used to eliminate a single point failure problem in the Key Distribution Center (KDC) and achieve better scalability. Public
Kaiqi Xiong
doaj +1 more source
IMPROVING SMART GRID SECURITY USING MERKLE TREES [PDF]
—Presently nations worldwide are starting to convert their aging electrical power infrastructures into modern, dynamic power grids. Smart Grid offers much in the way of efficiencies and robustness to the electrical power grid, however its heavy reliance ...
Muñoz, Melesio Calderón
core +2 more sources
A watermarking scheme for a public‐key cryptographic functionality enables the embedding of a mark in the instance of the secret‐key algorithm such that the functionality of the original scheme is maintained, while it is infeasible for an adversary to ...
Foteini Baldimtsi+2 more
doaj +1 more source
Homomorphic signcryption with public plaintext‐result checkability
Signcryption originally proposed by Zheng (CRYPTO′97) is a useful cryptographic primitive that provides strong confidentiality and integrity guarantees.
Shimin Li+3 more
doaj +1 more source
Transitory Master Key Transport Layer Security for WSNs
Security approaches in Wireless Sensor Networks (WSNs) are normally based on symmetric cryptography. Instead of symmetric encryption, some alternative approaches have been developed by using public-key cryptography. However, the higher computational cost
Mattia Griotti+2 more
doaj +1 more source
Analysis of Elliptic Curve Cryptography (ECC) for Energy Efficiency in Wireless Sensor Networks
Rapid growth of wireless sensor networks (WSN) in recent times has resulted in greater security requirements. One of the primary concerns in wireless sensor networks is energy efficiency and security mechanisms are no different.
Zain Ul Abideen Tariq+2 more
doaj +1 more source
Towards an efficient LWE‐based fully homomorphic encryption scheme
The security of most early fully homomorphic encryption schemes was based on the hardness of the Learning with Errors (LWE) problem. These schemes were inefficient in terms of per gate computations and public‐key size.
Uddipana Dowerah+1 more
doaj +1 more source
Quantum-Resistant Cryptography [PDF]
Quantum-resistant cryptography is cryptography that aims to deliver cryptographic functions and protocols that remain secure even if large-scale fault-tolerant quantum computers are built. NIST will soon announce the first selected public-key cryptography algorithms in its Post-Quantum Cryptography (PQC) standardization which is the most important ...
arxiv
A revolutionary change to public-key cryptography can be considered as an Identity Based Cryptography (IBC) in which identity of the receiver is being used as a public key for encrypting a message and Key Generation Centre (KGC).
Maitri Patel, Rajan Patel
doaj +1 more source