Results 11 to 20 of about 124,822 (278)
Traceable Scheme of Public Key Encryption with Equality Test [PDF]
Public key encryption supporting equality test (PKEwET) schemes, because of their special function, have good applications in many fields, such as in cloud computing services, blockchain, and the Internet of Things.
Huijun Zhu +3 more
doaj +2 more sources
Certificateless Searchable Encryption Scheme in Multi-User Environment
Searchable encryption technology enables users to access data that has been made publicly encrypted without divulging the original content. The majority of the currently available multi-user certificateless searchable encryption technologies are based on
Tao Feng, Jiewen Si
doaj +1 more source
Research on the searchable encryption
Searchable encryption has been recognized as a promising method to achieve the secure cloud search.According to the types of encryption keys,searchable encryption can be divided into searchable public-key and symmetric-key encryptions.The existing and ...
Peng XU, Hai JIN
doaj +3 more sources
An Efficient Public-Key Dual-Receiver Encryption Scheme
Public-key dual-receiver encryption (PK-DRE) is a kind of particular public-key encryption for enabling two independent recipients to obtain the same plaintext from the same ciphertext.
Chenglong Gao +3 more
doaj +1 more source
New leakage-resilient CCA-secure public key encryption
This paper shows a generic method of constructing CCA-secure public key encryption schemes with leakage-resilience on the secret key. It is based on a new kind of universal2 hash proof system which accepts an auxiliary parameter.
Kurosawa Kaoru +2 more
doaj +1 more source
A New Technique in Rank Metric Code-Based Encryption
We propose a rank metric codes based encryption based on the hard problem of rank syndrome decoding problem. We propose a new encryption with a public key matrix by considering the adding of a random distortion matrix over F q m of full column ...
Terry Shue Chien Lau, Chik How Tan
doaj +1 more source
Leveled Certificateless Fully Homomorphic Encryption Schemes From Learning With Errors
Fully homomorphic encryption (FHE) is a form of public-key encryption that allows the computation of arbitrary functions on encrypted data without decrypting the data. As a result, it is a useful tool with numerous applications.
Mingxiang Li
doaj +1 more source
Incremental Deterministic Public-Key Encryption [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Mironov, Ilya +3 more
openaire +2 more sources
Survey on public key encryption with equality test
As one of the important methods of solving the problem of computation over encrypted data under multiple public keys in cloud environment,public key encryption with equality test (PKEET) supports to check whether two ciphertexts encrypted under (possibly)
Yuanhao WANG,Hongbo LI,Yuzhao CUI,Qingwen GUO,Qiong HUANG
doaj +3 more sources
Revisiting Shared Data Protection Against Key Exposure
This paper puts a new light on secure data storage inside distributed systems. Specifically, it revisits computational secret sharing in a situation where the encryption key is exposed to an attacker.
Bertoni Guido +7 more
core +3 more sources

