Results 141 to 150 of about 615,663 (220)
Some of the next articles are maybe not open access.
Request for Comments, 2022
This document describes a scheme for hybrid public-key encryption (HPKE). This scheme provides authenticated public key encryption of arbitrary-sized plaintexts for a recipient public key. HPKE works for any combination of an asymmetric key encapsulation
R. Barnes +3 more
openaire +2 more sources
This document describes a scheme for hybrid public-key encryption (HPKE). This scheme provides authenticated public key encryption of arbitrary-sized plaintexts for a recipient public key. HPKE works for any combination of an asymmetric key encapsulation
R. Barnes +3 more
openaire +2 more sources
Modern Cryptography with Proof Techniques and Applications, 2021
Seong Oun Hwang, Intae Kim, Wai Kong Lee
openaire +2 more sources
Seong Oun Hwang, Intae Kim, Wai Kong Lee
openaire +2 more sources
Searchable Public-Key Encryption With Cryptographic Reverse Firewalls for Cloud Storage
IEEE Transactions on Cloud Computing, 2023In order to protect data privacy in cloud storage, sensitive data is encrypted before being uploaded to a cloud server. How to retrieve ciphertext safely and effectively has become a problem.
Yuyang Zhou, Zhebin Hu, Fagen Li
semanticscholar +1 more source
SR-PEKS: Subversion-Resistant Public Key Encryption With Keyword Search
IEEE Transactions on Cloud Computing, 2023Public key encryption with keyword search (PEKS) provides secure searchable data encryption in cloud storage. Users can outsource encrypted data and keywords to a cloud server, and search target one without disclosing sensitive information.
Changsong Jiang +3 more
semanticscholar +1 more source
A Survey of Public-Key Encryption With Search Functionality for Cloud-Assisted IoT
IEEE Internet of Things Journal, 2022Nowadays, Internet of Things (IoT) is an attractive system to provide broad connectivity of a wide range of applications, and clouds are natural promoters.
H. Xiong +4 more
semanticscholar +1 more source
IEEE Transactions on Vehicular Technology, 2020
As the integration of the Internet of Vehicles and social networks, vehicular social networks (VSN) not only improves the efficiency and reliability of vehicular communication environment, but also provide more comprehensive social services for users ...
Biwen Chen +4 more
semanticscholar +1 more source
As the integration of the Internet of Vehicles and social networks, vehicular social networks (VSN) not only improves the efficiency and reliability of vehicular communication environment, but also provide more comprehensive social services for users ...
Biwen Chen +4 more
semanticscholar +1 more source
Public Key Encryption with Equality Test in the Standard Model
IACR Cryptology ePrint Archive, 2020Public key encryption with equality test (PKEET) is a cryptosystem that allows a tester who has trapdoors issued by one or more users Ui to perform equality tests on ciphertexts encrypted using public key(s) of Ui.
H. Lee +4 more
semanticscholar +1 more source
Group public key encryption with equality test against offline message recovery attack
Information Sciences, 2020Public key encryption with equality test (PKEET) allows a tester to check whether two ciphertexts encrypted under different public keys contain the same message without decrypting them.
Yunhao Ling +4 more
semanticscholar +1 more source
Certificateless public key encryption with cryptographic reverse firewalls
Journal of systems architecture, 2020The Snowden incident shows that powerful attackers can compromise users’ machines to steal users’ private information. Currently, many encryption schemes that have proven to be secure cannot detect vulnerabilities. These vulnerabilities may reveal users’
Yuyang Zhou, Jing Guo, Fagen Li
semanticscholar +1 more source
IEEE Transactions on Cloud Computing, 2019
Cloud storage enables users to outsource data to storage servers and retrieve target data efficiently. Some of the outsourced data are very sensitive and should be prevented for any leakage.
Y. Zhang +4 more
semanticscholar +1 more source
Cloud storage enables users to outsource data to storage servers and retrieve target data efficiently. Some of the outsourced data are very sensitive and should be prevented for any leakage.
Y. Zhang +4 more
semanticscholar +1 more source

