Results 41 to 50 of about 615,663 (220)

Efficient public key encryption with equality test in the standard model

open access: yesTheoretical Computer Science, 2019
Public key encryption with equality test (PKEET) is a special kind of public encryption scheme (PKE) that allows a tester to perform equality tests on ciphertexts generated by different public keys as well as the same public key.
Kai Zhang   +4 more
semanticscholar   +1 more source

Secure and {\sl Practical} Identity-Based Encryption [PDF]

open access: yes, 2005
In this paper, we present a variant of Waters' Identity-Based Encryption scheme with a much smaller public-key size (only a few kilobytes). We show that this variant is semantically secure against passive adversaries in the standard model.\smallskip In
Naccache, David
core   +1 more source

Security Against Related Randomness Attacks via Reconstructive Extractors [PDF]

open access: yes, 2015
. This paper revisits related randomness attacks against public key encryption schemes as introduced by Paterson, Schuldt and Sibborn (PKC 2014). We present a general transform achieving security for pub-lic key encryption in the related randomness ...
Paterson, Kenneth   +3 more
core   +2 more sources

Public-Key Encryption With Keyword Search via Obfuscation

open access: yesIEEE Access, 2019
Public-key encryption with keyword search (PEKS) enables users to search on encrypted data, which is applicable to the scenario of sharing data in the cloud storage. In this paper, we focus on how to construct a PEKS scheme via obfuscation.
Chengyu Hu   +3 more
doaj   +1 more source

Cybersecurity-Enhanced Encrypted Control System Using Keyed-Homomorphic Public Key Encryption

open access: yesIEEE Access, 2023
Encrypted control systems are secure control methods that use the cryptographic properties of a specific homomorphic encryption scheme. This study proposes a cyberattack-detectable encrypted control system and validates its effectiveness using a ...
Masaki Miyamoto   +3 more
doaj   +1 more source

Revisiting Shared Data Protection Against Key Exposure

open access: yes, 2020
This paper puts a new light on secure data storage inside distributed systems. Specifically, it revisits computational secret sharing in a situation where the encryption key is exposed to an attacker.
Bertoni Guido   +7 more
core   +1 more source

Anonymity-Preserving Public-Key Encryption: A Constructive Approach [PDF]

open access: yes, 2013
. A receiver-anonymous channel allows a sender to send a message to a receiver without an adversary learning for whom the message is intended. Wireless broadcast channels naturally provide receiver anonymity, as does multi-casting one message to a ...
A. Beimel   +18 more
core   +3 more sources

A Public Key Compression Scheme for Fully Homomorphic Encryption Based on Quadratic Parameters With Correction

open access: yesIEEE Access, 2017
For efficiency improvement and public key size reduction, a new public key compression scheme is proposed for fully homomorphic encryption based on quadratic parameters with correction (QPC-PKC scheme).
Liquan Chen, Ming Lim, Zijuan Fan
doaj   +1 more source

Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks

open access: yesIEEE Transactions on Industrial Informatics, 2018
The industrial Internet of Things is flourishing, which is unprecedentedly driven by the rapid development of wireless sensor networks (WSNs) with the assistance of cloud computing. The new wave of technology will give rise to new risks to cyber security,
Peng Xu   +4 more
semanticscholar   +1 more source

On a new fast public key cryptosystem [PDF]

open access: yes, 2015
This paper presents a new fast public key cryptosystem namely : a key exchange algorithm, a public key encryption algorithm and a digital signature algorithm, based on the difficulty to invert the following function : $F(x) =(a\times x)Mod(2^p)Div(2^q)$
Bouftass, Samir
core  

Home - About - Disclaimer - Privacy