Identity based proxy re-encryption scheme (IBPRE+) for secure cloud data sharing [PDF]
(c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or ...
Nie, Jinting +3 more
core +1 more source
Searchable Public Key Encryption Supporting Semantic Multi-Keywords Search
Searchable public key encryption (SPE) that supports multi-keywords search, allows data users to retrieve encrypted files of interest efficiently, and thus it has been intensively studied during recent years. However, most existing SPE solutions focus on
Yu Zhang, Yifan Wang, Yin Li
doaj +1 more source
Efficient All-or-Nothing Public Key Encryption With Authenticated Equality Test
Public key encryption with equality test (PKEET for short) is a new cryptographic primitive which allows a proxy to check whether two ciphertexts encrypted under different public keys are of the same plaintext.
Zhi-Yan Zhao, Peng Zeng
doaj +1 more source
ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging [PDF]
The social demand for email end-to-end encryption is barely supported by mainstream service providers. Autocrypt is a new community-driven open specification for e-mail encryption that attempts to respond to this demand.
Chor Benny +13 more
core +2 more sources
Pairing-Free for Public Key Encryption With Equality Test Scheme
The modular exponentiation has been proved better in terms of computational efficiency as compared to bilinear pairing. Therefore, discrete logarithm, a concept of modular exponentiation may be incorporated to present improved security schemes. With this
Huijun Zhu +3 more
doaj +1 more source
Public key encryption using block ciphers [PDF]
A method for deriving a public key encryption system from any `conventional' (secret key) block cipher is described. The method is related to, but improves upon, Merkle's 'puzzle system'
Mitchell, Chris J.
core
Applications of single-qubit rotations in quantum public-key cryptography
We discuss cryptographic applications of single-qubit rotations from the perspective of trapdoor one-way functions and public-key encryption. In particular, we present an asymmetric cryptosystem whose security relies on fundamental principles of quantum ...
A. Kawachi +3 more
core +1 more source
Multiple-Image Encryption Mechanism Based on Ghost Imaging and Public Key Cryptography
On the basis of ghost imaging, this paper proposes a multiple-image encryption scheme combining public key cryptography and Hadamard basis pattern. In the encryption system, a plurality of light paths are set, and the Hadamard basis patterns are used for
Leihong Zhang +3 more
doaj +1 more source
Combining Public Key Encryption with Keyword Search and Public Key Encryption
In this paper, we study the problem of secure integrating public key encryption with keyword search (PEKS) with public key data encryption (PKE). We argue the previous security model is not complete regarding keyword privacy and the previous constructions are secure only in the random oracle model.
Rui ZHANG, Hideki IMAI
openaire +2 more sources
Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE [PDF]
Lattice based encryption schemes and linear code based encryption schemes have received extensive attention in recent years since they have been considered as post-quantum candidate encryption schemes.
Wang, Yongge
core +2 more sources

