Results 21 to 30 of about 615,663 (220)

Leveled Certificateless Fully Homomorphic Encryption Schemes From Learning With Errors

open access: yesIEEE Access, 2020
Fully homomorphic encryption (FHE) is a form of public-key encryption that allows the computation of arbitrary functions on encrypted data without decrypting the data. As a result, it is a useful tool with numerous applications.
Mingxiang Li
doaj   +1 more source

Incremental Deterministic Public-Key Encryption [PDF]

open access: yesJournal of Cryptology, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Mironov, Ilya   +3 more
openaire   +2 more sources

FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things

open access: yesIEEE Transactions on Dependable and Secure Computing, 2019
Cloud-assisted Industrial Internet of Things (IIoT) relies on cloud computing to provide massive data storage services. To ensure the confidentiality, sensitive industrial data need to be encrypted before being outsourced to cloud storage server.
Xiaojun Zhang   +4 more
semanticscholar   +1 more source

Survey on public key encryption with equality test

open access: yes网络与信息安全学报, 2018
As one of the important methods of solving the problem of computation over encrypted data under multiple public keys in cloud environment,public key encryption with equality test (PKEET) supports to check whether two ciphertexts encrypted under (possibly)
Yuanhao WANG,Hongbo LI,Yuzhao CUI,Qingwen GUO,Qiong HUANG
doaj   +3 more sources

Decryption speed up of ElGamal with composite modulus.

open access: yesPLoS ONE, 2020
Public key cryptosystems such as RSA, rebalanced RSA and ElGamal have the disadvantage of serious asymmetry between encryption and decryption speed.
GyuChol Kim, SuChol Li
doaj   +1 more source

CCA-Secure Deterministic Identity-Based Encryption Scheme [PDF]

open access: yesJournal of Universal Computer Science, 2019
Deterministic public-key encryption, encrypting a plaintext into a unique ciphertext without involving any randomness, was introduced by Bellare, Boldyreva, and O'Neill (CRYPTO 2007) as a realistic alternative to some inherent drawbacks in randomized ...
Meijuan Huang   +5 more
doaj   +3 more sources

Provably sender-deniable encryption scheme [PDF]

open access: yesComputer Science Journal of Moldova, 2015
The use of the well known provably secure public-key cryptoscheme by Rabin is extended for the case of the deniable encryption. In the proposed new sender-deniable encryption scheme the cryptogram is computed as coefficients of quadratic congruence, the
N.A. Moldovyan   +2 more
doaj  

A CCA2 Secure Variant of the McEliece Cryptosystem [PDF]

open access: yes, 2012
The McEliece public-key encryption scheme has become an interesting alternative to cryptosystems based on number-theoretical problems. Differently from RSA and ElGa- mal, McEliece PKC is not known to be broken by a quantum computer.
Dowsley, Rafael   +3 more
core   +5 more sources

Efficient public-key cryptography with bounded leakage and tamper resilience [PDF]

open access: yes, 2016
We revisit the question of constructing public-key encryption and signature schemes with security in the presence of bounded leakage and tampering memory attacks.
A Faonio   +46 more
core   +2 more sources

Public Key Image Encryption Based on Compressed Sensing

open access: yesIEEE Access, 2019
The compression feature of compressed sensing (CS) enables that the ciphertext lengths of multimedia encryption schemes have reduced dramatically, and the simple linear measurements make the encryption process extremely efficient.
Dong Xie
doaj   +1 more source

Home - About - Disclaimer - Privacy