Results 151 to 160 of about 615,663 (220)
Some of the next articles are maybe not open access.

Public-Key Encryption

1999
Public-key algorithms use a secret element and a public element to their code. One of the main algorithms is RSA. Compared with DES it is relatively slow but it has the advantage that users can choose their own key whenever they need one. The most commonly used public-key cryptosystems are covered in the next sections.
  +4 more sources

Public Key Encryption

2011
I’m sure you’ve heard of public key encryption (PKE). You probably use it every day—if not in your code or on your servers, then on the Internet. When you use secure socket layers (SSL) in your browser or when you see the lock or key symbol and see https:(with the s) as the protocol in the address bar, you are using PKE and other encryption.
  +5 more sources

A provably secure certificateless public key encryption with keyword search

Zhongguó gongchéng xuékan, 2019
Public key encryption with keyword search, known as PEKS, is a useful technology in some Storage-as-a-Service clouds. This technology allows the cloud server to search on a keyword, which is received from the data owner/user, over encrypted data without ...
Tsu-Yang Wu   +4 more
semanticscholar   +1 more source

Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data

IEEE Transactions on Emerging Topics in Computing, 2019
As more data from Industrial Internet of Things (IIoT) devices are been outsourced to the cloud, the need to ensure/achieve data privacy will be increasingly pressing.
Biwen Chen   +4 more
semanticscholar   +1 more source

Lightweight Public Key Authenticated Encryption With Keyword Search Against Adaptively-Chosen-Targets Adversaries for Mobile Devices

IEEE Transactions on Mobile Computing, 2022
Cloud storage services have grown extensively in recent years. For security and privacy purposes, sensitive data need to be outsourced to clouds in encrypted form.
Yang Lu, Jiguo Li
semanticscholar   +1 more source

Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage

IEEE Transactions on Cloud Computing, 2019
Cloud storage has become a primary industry in remote data management service but also attracts security concerns, where the best available approach for preventing data disclosure is encryption.
Ming Zeng   +3 more
semanticscholar   +1 more source

Public-Key Encryption

2012
The preceding chapter offered a brief glimpse at the origins of public-key cryptography, which was born with the purpose of enabling secure communication between two parties that do not have to share a common secret key. Public-key cryptography started with the realization that it should be possible to design encryption schemes in which it is ...
openaire   +2 more sources

Public key encryption

ACM SIGSAM Bulletin, 1987
The RSA method is used for the interchange of secret messages via insecure channels. It is elegant in theory and fast and reliable in practice. Applications are in the field of communication networks.The method is initialized by choosing some suitable large prime numbers. Encrypting and decrypting of a message are done by modular arithmetic.
openaire   +1 more source

Public-key encryption with chaos

Chaos: An Interdisciplinary Journal of Nonlinear Science, 2004
We propose public-key encryption algorithms based on chaotic maps, which are generalization of well-known and commercially used algorithms: Rivest–Shamir–Adleman (RSA), ElGamal, and Rabin. For the case of generalized RSA algorithm we discuss in detail its software implementation and properties. We show that our algorithm is as secure as RSA algorithm.
Kocarev, Ljupco   +3 more
openaire   +3 more sources

Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability

Journal of systems architecture, 2021
The notion of Public-key Encryption with Keyword Search (PEKS) was first proposed by Boneh et al. in 2004. However, almost all PEKS schemes cannot resist offline Keyword Guessing Attacks (KGA). To address this issue, Huang and Li introduced the notion of
Xiangyu Pan, Fagen Li
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy