Results 161 to 170 of about 615,663 (220)
Some of the next articles are maybe not open access.
Information Sciences, 2018
Public key encryption with equality test (PKEET) allows the cloud server to test whether two ciphertexts are generated on the same message. Recently, Lee et al.
Xi Jun Lin, Lin Sun, Haipeng Qu
semanticscholar +1 more source
Public key encryption with equality test (PKEET) allows the cloud server to test whether two ciphertexts are generated on the same message. Recently, Lee et al.
Xi Jun Lin, Lin Sun, Haipeng Qu
semanticscholar +1 more source
Certificateless public key encryption with equality test
Information Sciences, 2018In this paper, we present the concept of certificateless public key encryption with equality test (CL-PKEET), which integrates certificateless public key cryptography (CL-PKC) into public key encryption with equality test (PKEET) to solve the key escrow ...
Haipeng Qu +4 more
semanticscholar +1 more source
Public-key authenticated encryption with keyword search revisited: Security model and constructions
Information Sciences, 2020In cloud era, it is necessary to store sensitive data in an encrypted form. This arises the interesting and challenging problem of searching on encrypted data.
Baodong Qin +4 more
semanticscholar +1 more source
Updatable Public Key Encryption in the Standard Model
Theory of Cryptography Conference, 2021Y. Dodis +2 more
semanticscholar +1 more source
2017
In this chapter, we introduce public-key encryption. We first consider the motivation behind the concept of public-key cryptography and introduce the hard problems on which popular public-key encryption schemes are based. We then discuss two of the best-known public-key cryptosystems, RSA and ElGamal.
openaire +1 more source
In this chapter, we introduce public-key encryption. We first consider the motivation behind the concept of public-key cryptography and introduce the hard problems on which popular public-key encryption schemes are based. We then discuss two of the best-known public-key cryptosystems, RSA and ElGamal.
openaire +1 more source
Anonymous, Robust Post-Quantum Public Key Encryption
IACR Cryptology ePrint Archive, 2021Paul Grubbs, Varun Maram, K. Paterson
semanticscholar +1 more source
2001
A key problem of the symmetric cryptosystems that we have described so far is key distribution and key management. When Alice and Bob use such a system, they must exchange a secret key before they can secretly communicate. For the key-exchange, they need, for example, a secure channel or a courier.
openaire +1 more source
A key problem of the symmetric cryptosystems that we have described so far is key distribution and key management. When Alice and Bob use such a system, they must exchange a secret key before they can secretly communicate. For the key-exchange, they need, for example, a secure channel or a courier.
openaire +1 more source
Multipurpose Public-Key Encryption
2017We propose a new type of public-key schemes, that simultaneously satisfies selective opening (SO) security, key-dependent message (KDM) security and leakage-resilience. Our construction can be instantiated under the quadratic residuosity (QR) assumption or decisional composite residuosity (DCR) assumption.
Rui Zhang, Kai He
openaire +1 more source
2017
This paper proposes a public-key cryptosystem and a short password encryption mode, where traditional hardness assumptions are replaced by specific refinements of the CAPTCHA concept called Decisional and Existential CAPTCHAs.
Houda Ferradi +2 more
openaire +1 more source
This paper proposes a public-key cryptosystem and a short password encryption mode, where traditional hardness assumptions are replaced by specific refinements of the CAPTCHA concept called Decisional and Existential CAPTCHAs.
Houda Ferradi +2 more
openaire +1 more source

