Results 51 to 60 of about 615,663 (220)

Identity based proxy re-encryption scheme (IBPRE+) for secure cloud data sharing [PDF]

open access: yes, 2016
(c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or ...
Nie, Jinting   +3 more
core   +1 more source

Searchable Public Key Encryption Supporting Semantic Multi-Keywords Search

open access: yesIEEE Access, 2019
Searchable public key encryption (SPE) that supports multi-keywords search, allows data users to retrieve encrypted files of interest efficiently, and thus it has been intensively studied during recent years. However, most existing SPE solutions focus on
Yu Zhang, Yifan Wang, Yin Li
doaj   +1 more source

Efficient All-or-Nothing Public Key Encryption With Authenticated Equality Test

open access: yesIEEE Access, 2021
Public key encryption with equality test (PKEET for short) is a new cryptographic primitive which allows a proxy to check whether two ciphertexts encrypted under different public keys are of the same plaintext.
Zhi-Yan Zhao, Peng Zeng
doaj   +1 more source

ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging [PDF]

open access: yes, 2018
The social demand for email end-to-end encryption is barely supported by mainstream service providers. Autocrypt is a new community-driven open specification for e-mail encryption that attempts to respond to this demand.
Chor Benny   +13 more
core   +2 more sources

Pairing-Free for Public Key Encryption With Equality Test Scheme

open access: yesIEEE Access, 2021
The modular exponentiation has been proved better in terms of computational efficiency as compared to bilinear pairing. Therefore, discrete logarithm, a concept of modular exponentiation may be incorporated to present improved security schemes. With this
Huijun Zhu   +3 more
doaj   +1 more source

Public key encryption using block ciphers [PDF]

open access: yes, 2003
A method for deriving a public key encryption system from any `conventional' (secret key) block cipher is described. The method is related to, but improves upon, Merkle's 'puzzle system'
Mitchell, Chris J.
core  

Applications of single-qubit rotations in quantum public-key cryptography

open access: yes, 2008
We discuss cryptographic applications of single-qubit rotations from the perspective of trapdoor one-way functions and public-key encryption. In particular, we present an asymmetric cryptosystem whose security relies on fundamental principles of quantum ...
A. Kawachi   +3 more
core   +1 more source

Multiple-Image Encryption Mechanism Based on Ghost Imaging and Public Key Cryptography

open access: yesIEEE Photonics Journal, 2019
On the basis of ghost imaging, this paper proposes a multiple-image encryption scheme combining public key cryptography and Hadamard basis pattern. In the encryption system, a plurality of light paths are set, and the Hadamard basis patterns are used for
Leihong Zhang   +3 more
doaj   +1 more source

Combining Public Key Encryption with Keyword Search and Public Key Encryption

open access: yesIEICE Transactions on Information and Systems, 2009
In this paper, we study the problem of secure integrating public key encryption with keyword search (PEKS) with public key data encryption (PKE). We argue the previous security model is not complete regarding keyword privacy and the previous constructions are secure only in the random oracle model.
Rui ZHANG, Hideki IMAI
openaire   +2 more sources

Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE [PDF]

open access: yes, 2015
Lattice based encryption schemes and linear code based encryption schemes have received extensive attention in recent years since they have been considered as post-quantum candidate encryption schemes.
Wang, Yongge
core   +2 more sources

Home - About - Disclaimer - Privacy