Results 141 to 150 of about 615,663 (220)
Some of the next articles are maybe not open access.

Hybrid Public Key Encryption

Request for Comments, 2022
This document describes a scheme for hybrid public-key encryption (HPKE). This scheme provides authenticated public key encryption of arbitrary-sized plaintexts for a recipient public key. HPKE works for any combination of an asymmetric key encapsulation
R. Barnes   +3 more
openaire   +2 more sources

Public-Key Encryption

Modern Cryptography with Proof Techniques and Applications, 2021
Seong Oun Hwang, Intae Kim, Wai Kong Lee
openaire   +2 more sources

Searchable Public-Key Encryption With Cryptographic Reverse Firewalls for Cloud Storage

IEEE Transactions on Cloud Computing, 2023
In order to protect data privacy in cloud storage, sensitive data is encrypted before being uploaded to a cloud server. How to retrieve ciphertext safely and effectively has become a problem.
Yuyang Zhou, Zhebin Hu, Fagen Li
semanticscholar   +1 more source

SR-PEKS: Subversion-Resistant Public Key Encryption With Keyword Search

IEEE Transactions on Cloud Computing, 2023
Public key encryption with keyword search (PEKS) provides secure searchable data encryption in cloud storage. Users can outsource encrypted data and keywords to a cloud server, and search target one without disclosing sensitive information.
Changsong Jiang   +3 more
semanticscholar   +1 more source

A Survey of Public-Key Encryption With Search Functionality for Cloud-Assisted IoT

IEEE Internet of Things Journal, 2022
Nowadays, Internet of Things (IoT) is an attractive system to provide broad connectivity of a wide range of applications, and clouds are natural promoters.
H. Xiong   +4 more
semanticscholar   +1 more source

A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks

IEEE Transactions on Vehicular Technology, 2020
As the integration of the Internet of Vehicles and social networks, vehicular social networks (VSN) not only improves the efficiency and reliability of vehicular communication environment, but also provide more comprehensive social services for users ...
Biwen Chen   +4 more
semanticscholar   +1 more source

Public Key Encryption with Equality Test in the Standard Model

IACR Cryptology ePrint Archive, 2020
Public key encryption with equality test (PKEET) is a cryptosystem that allows a tester who has trapdoors issued by one or more users Ui to perform equality tests on ciphertexts encrypted using public key(s) of Ui.
H. Lee   +4 more
semanticscholar   +1 more source

Group public key encryption with equality test against offline message recovery attack

Information Sciences, 2020
Public key encryption with equality test (PKEET) allows a tester to check whether two ciphertexts encrypted under different public keys contain the same message without decrypting them.
Yunhao Ling   +4 more
semanticscholar   +1 more source

Certificateless public key encryption with cryptographic reverse firewalls

Journal of systems architecture, 2020
The Snowden incident shows that powerful attackers can compromise users’ machines to steal users’ private information. Currently, many encryption schemes that have proven to be secure cannot detect vulnerabilities. These vulnerabilities may reveal users’
Yuyang Zhou, Jing Guo, Fagen Li
semanticscholar   +1 more source

Blockchain-Assisted Public-Key Encryption with Keyword Search Against Keyword Guessing Attacks for Cloud Storage

IEEE Transactions on Cloud Computing, 2019
Cloud storage enables users to outsource data to storage servers and retrieve target data efficiently. Some of the outsourced data are very sensitive and should be prevented for any leakage.
Y. Zhang   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy