Results 11 to 20 of about 615,663 (220)
Symmetric Public-Key Encryption [PDF]
Public-key encryption would seem to be inherently asymmetric. in that only messages sent to a user can be encrypted using his public key. We demonstrate that the use of interactive protocols for sending encrypted messages enables a symmetric use of public keys; we give cryptographic protocols for the following tasks: 1.
Galil, Zvi, Landau, Gad M., Yung, Moti
openaire +5 more sources
A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare [PDF]
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee).
Hartel, Pieter +3 more
core +18 more sources
ELLIPTIC CURVES PUBLIC KEY TRAITOR TRACING SCHEME [PDF]
In this paper we use the elliptic curves system in the Public Key Traitor Tracing Scheme. The Elliptic Curve points form Abelian group that used in the Public Key Traitor Tracing Scheme.
Ali M. Sagheer
doaj +1 more source
Public-Key Encryption with Delegated Search [PDF]
In public-key setting, Alice encrypts email with public key of Bob, so that only Bob will be able to learn contents of email. Consider scenario when computer of Alice is infected and unbeknown to Alice it also embeds malware into message.
Hartel, Pieter +3 more
core +3 more sources
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption [PDF]
An affine determinant program ADP: {0,1}^n → {0,1} is specified by a tuple (A,B_1,...,B_n) of square matrices over F_q and a function Eval: F_q → {0,1}, and evaluated on x \in {0,1}^n by computing Eval(det(A + sum_{i \in [n]} x_i B_i)).
Bartusek, James +5 more
core +2 more sources
Certificateless Searchable Encryption Scheme in Multi-User Environment
Searchable encryption technology enables users to access data that has been made publicly encrypted without divulging the original content. The majority of the currently available multi-user certificateless searchable encryption technologies are based on
Tao Feng, Jiewen Si
doaj +1 more source
Research on the searchable encryption
Searchable encryption has been recognized as a promising method to achieve the secure cloud search.According to the types of encryption keys,searchable encryption can be divided into searchable public-key and symmetric-key encryptions.The existing and ...
Peng XU, Hai JIN
doaj +3 more sources
An Efficient Public-Key Dual-Receiver Encryption Scheme
Public-key dual-receiver encryption (PK-DRE) is a kind of particular public-key encryption for enabling two independent recipients to obtain the same plaintext from the same ciphertext.
Chenglong Gao +3 more
doaj +1 more source
New leakage-resilient CCA-secure public key encryption
This paper shows a generic method of constructing CCA-secure public key encryption schemes with leakage-resilience on the secret key. It is based on a new kind of universal2 hash proof system which accepts an auxiliary parameter.
Kurosawa Kaoru +2 more
doaj +1 more source
A New Technique in Rank Metric Code-Based Encryption
We propose a rank metric codes based encryption based on the hard problem of rank syndrome decoding problem. We propose a new encryption with a public key matrix by considering the adding of a random distortion matrix over F q m of full column ...
Terry Shue Chien Lau, Chik How Tan
doaj +1 more source

