Results 11 to 20 of about 19,147 (192)
Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley +1 more source
A lightweight McEliece cryptosystem co-processor design [PDF]
Due to the rapid advances in the development of quantum computers and their susceptibility to errors, there is a renewed interest in error correction algorithms.
Agrawal, Rashmi +3 more
core +2 more sources
A Group-Based NTRU-Like Public-Key Cryptosystem for IoT
The Internet of things have been widely used to improve our daily life. Public-key cryptosystem plays a central role in the security of IoT. However, classic public-key cryptosystems such as RSA and ECC are not suitable for IoT because of the complicated
Li Shuai +3 more
doaj +1 more source
A new code‐based digital signature based on the McEliece cryptosystem
Digital signature schemes are used for the authentication and verification of signatures. The Courtois–Finiasz–Sendrier (CFS) digital signature is a well‐known code‐based digital signature scheme based on the Niederreiter cryptosystem. However, it is not
Farshid Haidary Makoui +2 more
doaj +1 more source
Poly-Dragon: an efficient multivariate public key cryptosystem
In this paper, we propose an efficient multivariate public key cryptosystem. Public key of our cryptosystem contains polynomials of total degree three in plaintext and ciphertext variables, two in plaintext variables and one in ciphertext variables ...
Singh Rajesh P., Saikia A., Sarma B. K.
doaj +1 more source
Public Key Encryption Supporting Plaintext Equality Test and User-Specified Authorization [PDF]
In this paper we investigate a category of public key encryption schemes which supports plaintext equality test and user-specified authorization. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a ...
Tang, Qiang
core +5 more sources
Key-Insulated Public Key Cryptosystems [PDF]
Cryptographic computations (decryption, signature generation, etc.) are often performed on a relatively insecure device (e.g., a mobile device or an Internet-connected host) which cannot be trusted to maintain secrecy of the private key. We propose and investigate the notion of key-insulated security whose goal is to minimize the damage caused by ...
Yevgeniy Dodis +3 more
openaire +1 more source
Public key cryptosystem based on algebraic geometric codes
A public-key cryptosystem based on algebraic geometric codes was proposed.The cryptosystem is a pub-lic-key system combined with error correcting.Compared with M public-key system and some variants,the performance of the public-key cryptosystem was ...
ZHANG Ying, YUE Dian-wu
doaj +2 more sources
Public-Key Cryptosystems and Bounded Distance Decoding of Linear Codes
Error-correcting codes form an important topic in information theory. They are used to correct errors that occur during transmission on a noisy channel. An important method for correcting errors is bounded distance decoding.
Selda Çalkavur
doaj +1 more source
CQTRU: A Commutative Quaternions Rings Based Public Key Cryptosystem [PDF]
In this paper, we propose a new version of the NTRU public key cryptosystem called CQTRU. It is a four-dimensional cryptosystem based on the commutative quaternion ring.
Nadia M.G. Alsaidi +2 more
doaj +1 more source

