Results 1 to 10 of about 124,822 (278)
Symmetric Public-Key Encryption [PDF]
Public-key encryption would seem to be inherently asymmetric. in that only messages sent to a user can be encrypted using his public key. We demonstrate that the use of interactive protocols for sending encrypted messages enables a symmetric use of ...
Galil, Zvi, Landau, Gad M., Yung, Moti
core +5 more sources
Triple receiver public key encryption cryptosystem
A triple receiver public key cryptosystem was proposed. In the cryptosystem, a sender encrypted a message and sent to three receivers, while the three receivers were able to decrypt the message with their own private keys.
ZHAO Liutao, WANG Caiqun +2 more
doaj +3 more sources
On Multiple Encryption for Public-Key Cryptography
Using multiple, individual encryption schemes is a well-established method to increase the overall security of encrypted data. These so-called multiple encryption or hybrid schemes have regained traction in the context of public-key cryptography due to ...
Tudor Soroceanu +2 more
doaj +1 more source
Public-key encryption is often used to protect data security/privacy and secure communication in scenarios of cloud computing and edge computing. Related randomness attacks model (RRA) for public-key encryption was motivated by randomness failures.
Pengtao Liu
doaj +1 more source
An Integer Fully Homomorphic Encryption Scheme with Shorter Public Key Size [PDF]
Aiming at the problem that the efficiency of the integer Fully Homomorphic Encryption(FHE) scheme is low and the public key is long,Coron’s public key compression technique is used to encryption algorithm with a quadratic form,a partial homomorphic ...
SUN Nigang,ZHU Haoran,CHEN Xuanren
doaj +1 more source
Public-Key Encryption with Quantum Keys
This submission subsumes arXiv:2303.01143 and arXiv:2303 ...
Khashayar Barooti +6 more
openaire +2 more sources
On Using Encryption Techniques to Enhance Sticky Policies Enforcement [PDF]
How to enforce privacy policies to protect sensitive personal data has become an urgent research topic for security researchers, as very little has been done in this field apart from some ad hoc research efforts.
Tang, Qiang
core +18 more sources
ELLIPTIC CURVES PUBLIC KEY TRAITOR TRACING SCHEME [PDF]
In this paper we use the elliptic curves system in the Public Key Traitor Tracing Scheme. The Elliptic Curve points form Abelian group that used in the Public Key Traitor Tracing Scheme.
Ali M. Sagheer
doaj +1 more source
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption [PDF]
An affine determinant program ADP: {0,1}^n → {0,1} is specified by a tuple (A,B_1,...,B_n) of square matrices over F_q and a function Eval: F_q → {0,1}, and evaluated on x \in {0,1}^n by computing Eval(det(A + sum_{i \in [n]} x_i B_i)).
Bartusek, James +5 more
core +2 more sources
Public-Key Encryption with Delegated Search [PDF]
In public-key setting, Alice encrypts email with public key of Bob, so that only Bob will be able to learn contents of email. Consider scenario when computer of Alice is infected and unbeknown to Alice it also embeds malware into message.
Hartel, Pieter +3 more
core +3 more sources

