Results 31 to 40 of about 507,576 (358)

Homomorphic signcryption with public plaintext‐result checkability

open access: yesIET Information Security, 2021
Signcryption originally proposed by Zheng (CRYPTO′97) is a useful cryptographic primitive that provides strong confidentiality and integrity guarantees.
Shimin Li   +3 more
doaj   +1 more source

Lossless and Reversible Data Hiding in Encrypted Images With Public Key Cryptography

open access: yesRice, 2017
— The Lossless data hiding provides the embedding of data in a host image without any loss of data. This research explain a lossless data hiding and image cryptography method based on Choas - Block to image encryption the lossless means if the marked ...
Monika Bartwal, R. Bharti
semanticscholar   +1 more source

Towards an efficient LWE‐based fully homomorphic encryption scheme

open access: yesIET Information Security, 2022
The security of most early fully homomorphic encryption schemes was based on the hardness of the Learning with Errors (LWE) problem. These schemes were inefficient in terms of per gate computations and public‐key size.
Uddipana Dowerah   +1 more
doaj   +1 more source

Tensor-based trapdoors for CVP and their application to public key cryptography [PDF]

open access: yes, 1999
We propose two trapdoors for the Closest-Vector-Problem in lattices (CVP) related to the lattice tensor product.
Fischlin, Roger, Seifert, Jean-Pierre
core   +2 more sources

Analysis of Elliptic Curve Cryptography (ECC) for Energy Efficiency in Wireless Sensor Networks

open access: yesNUST Journal of Engineering Sciences, 2009
Rapid growth of wireless sensor networks (WSN) in recent times has resulted in greater security requirements. One of the primary concerns in wireless sensor networks is energy efficiency and security mechanisms are no different.
Zain Ul Abideen Tariq   +2 more
doaj   +1 more source

Public Key Cryptography [PDF]

open access: yesJournal of Physics: Conference Series, 2020
Abstract Public Key Cryptography is a software model that presents the process of encoding information, in this case the documents contained in a file. The encoding process begins by determining the master file or document that is ready to be encoded, then by applying the combination method, shifting and implementing the pass phrase to ...
openaire   +1 more source

A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things

open access: yesIEEE Access, 2019
The Internet of Things envisages connecting all physical objects or things to the Internet, using devices as diverse as smartphones, coffee makers, washing machines, automobiles, lamps, and wearable devices, among many others.
Manisha Malik, M. Dutta, J. Granjal
semanticscholar   +1 more source

Dynamic Cryptography Integrated Secured Decentralized Applications with Blockchain Programming

open access: yesWasit Journal of Computer and Mathematics Science, 2022
Blocks and chains are the building blocks of the blockchain, which is a community network. Blocks and chains are two terms used to describe collections of data information.
Jamal Kh-Madhloom
doaj   +1 more source

Asynchronous Consensus without Trusted Setup or Public-Key Cryptography

open access: yesIACR Cryptology ePrint Archive
Byzantine consensus is a fundamental building block in distributed cryptographic problems. Despite decades of research, most existing asynchronous consensus protocols require a strong trusted setup and expensive public-key cryptography. In this paper, we
Sourav Das   +5 more
semanticscholar   +1 more source

Quantum‐resistant anonymous identity‐based encryption with trable identities

open access: yesIET Information Security, 2022
Identity‐based encryption (IBE), introduced by Shamir, eliminates the need for public‐key infrastructure. The sender can simply encrypt a message by using the recipient's identity (such as email or IP address) without needing to look up the public key ...
Zi‐Yuan Liu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy