Results 1 to 10 of about 615,663 (220)

Public-Key Encryption with Quantum Keys [PDF]

open access: yesIACR Cryptology ePrint Archive, 2023
This submission subsumes arXiv:2303.01143 and arXiv:2303 ...
Khashayar Barooti   +6 more
openaire   +3 more sources

Public Key Encryption with Keyword Search in Cloud: A Survey. [PDF]

open access: yesEntropy (Basel), 2020
With the popularization of cloud computing, many business and individuals prefer to outsource their data to cloud in encrypted form to protect data confidentiality. However, how to search over encrypted data becomes a concern for users.
Zhou Y, Li N, Tian Y, An D, Wang L.
europepmc   +2 more sources

Public Key Encryption with Secure Key Leasing [PDF]

open access: yesIACR Cryptology ePrint Archive, 2023
68 pages, 4 figures. added related works and a comparison with a concurrent work (2023-04-07)
Agrawal, Shweta   +4 more
openaire   +3 more sources

Public-Key Encryption Secure Against Related Randomness Attacks for Improved End-to-End Security of Cloud/Edge Computing

open access: yesIEEE Access, 2020
Public-key encryption is often used to protect data security/privacy and secure communication in scenarios of cloud computing and edge computing. Related randomness attacks model (RRA) for public-key encryption was motivated by randomness failures.
Pengtao Liu
doaj   +2 more sources

Traceable Scheme of Public Key Encryption with Equality Test [PDF]

open access: yesEntropy, 2022
Public key encryption supporting equality test (PKEwET) schemes, because of their special function, have good applications in many fields, such as in cloud computing services, blockchain, and the Internet of Things.
Huijun Zhu   +3 more
doaj   +2 more sources

A Practical Public Key Encryption Scheme Based on Learning Parity With Noise

open access: yesIEEE Access, 2018
To protect cyber security and privacy, it is critical to design security and practical public key encryption schemes. Today, big data and cloud computing bring not only unprecedented opportunities but also fundamental security challenges.
Zhimin Yu   +4 more
doaj   +2 more sources

Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way Functions [PDF]

open access: yesIACR Cryptology ePrint Archive, 2023
We construct quantum public-key encryption from one-way functions. In our construction, public keys are quantum, but ciphertexts are classical. Quantum public-key encryption from one-way functions (or weaker primitives such as pseudorandom function-like ...
Fuyuki Kitagawa   +3 more
semanticscholar   +1 more source

Triple receiver public key encryption cryptosystem

open access: yes网络与信息安全学报, 2020
A triple receiver public key cryptosystem was proposed. In the cryptosystem, a sender encrypted a message and sent to three receivers, while the three receivers were able to decrypt the message with their own private keys.
ZHAO Liutao, WANG Caiqun   +2 more
doaj   +3 more sources

On Multiple Encryption for Public-Key Cryptography

open access: yesCryptography, 2023
Using multiple, individual encryption schemes is a well-established method to increase the overall security of encrypted data. These so-called multiple encryption or hybrid schemes have regained traction in the context of public-key cryptography due to ...
Tudor Soroceanu   +2 more
doaj   +1 more source

An Integer Fully Homomorphic Encryption Scheme with Shorter Public Key Size [PDF]

open access: yesJisuanji gongcheng, 2018
Aiming at the problem that the efficiency of the integer Fully Homomorphic Encryption(FHE) scheme is low and the public key is long,Coron’s public key compression technique is used to encryption algorithm with a quadratic form,a partial homomorphic ...
SUN Nigang,ZHU Haoran,CHEN Xuanren
doaj   +1 more source

Home - About - Disclaimer - Privacy