Results 41 to 50 of about 615,663 (220)
Efficient public key encryption with equality test in the standard model
Public key encryption with equality test (PKEET) is a special kind of public encryption scheme (PKE) that allows a tester to perform equality tests on ciphertexts generated by different public keys as well as the same public key.
Kai Zhang +4 more
semanticscholar +1 more source
Secure and {\sl Practical} Identity-Based Encryption [PDF]
In this paper, we present a variant of Waters' Identity-Based Encryption scheme with a much smaller public-key size (only a few kilobytes). We show that this variant is semantically secure against passive adversaries in the standard model.\smallskip In
Naccache, David
core +1 more source
Security Against Related Randomness Attacks via Reconstructive Extractors [PDF]
. This paper revisits related randomness attacks against public key encryption schemes as introduced by Paterson, Schuldt and Sibborn (PKC 2014). We present a general transform achieving security for pub-lic key encryption in the related randomness ...
Paterson, Kenneth +3 more
core +2 more sources
Public-Key Encryption With Keyword Search via Obfuscation
Public-key encryption with keyword search (PEKS) enables users to search on encrypted data, which is applicable to the scenario of sharing data in the cloud storage. In this paper, we focus on how to construct a PEKS scheme via obfuscation.
Chengyu Hu +3 more
doaj +1 more source
Cybersecurity-Enhanced Encrypted Control System Using Keyed-Homomorphic Public Key Encryption
Encrypted control systems are secure control methods that use the cryptographic properties of a specific homomorphic encryption scheme. This study proposes a cyberattack-detectable encrypted control system and validates its effectiveness using a ...
Masaki Miyamoto +3 more
doaj +1 more source
Revisiting Shared Data Protection Against Key Exposure
This paper puts a new light on secure data storage inside distributed systems. Specifically, it revisits computational secret sharing in a situation where the encryption key is exposed to an attacker.
Bertoni Guido +7 more
core +1 more source
Anonymity-Preserving Public-Key Encryption: A Constructive Approach [PDF]
. A receiver-anonymous channel allows a sender to send a message to a receiver without an adversary learning for whom the message is intended. Wireless broadcast channels naturally provide receiver anonymity, as does multi-casting one message to a ...
A. Beimel +18 more
core +3 more sources
For efficiency improvement and public key size reduction, a new public key compression scheme is proposed for fully homomorphic encryption based on quadratic parameters with correction (QPC-PKC scheme).
Liquan Chen, Ming Lim, Zijuan Fan
doaj +1 more source
Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks
The industrial Internet of Things is flourishing, which is unprecedentedly driven by the rapid development of wireless sensor networks (WSNs) with the assistance of cloud computing. The new wave of technology will give rise to new risks to cyber security,
Peng Xu +4 more
semanticscholar +1 more source
On a new fast public key cryptosystem [PDF]
This paper presents a new fast public key cryptosystem namely : a key exchange algorithm, a public key encryption algorithm and a digital signature algorithm, based on the difficulty to invert the following function : $F(x) =(a\times x)Mod(2^p)Div(2^q)$
Bouftass, Samir
core

