Results 71 to 80 of about 615,663 (220)
ESTABLISHED WAYS TO ATTACK EVEN THE BEST ENCRYPTION ALGORITHM [PDF]
Which solution is the best – public key or private key encryption? This question cannot have a very rigorous, logical and definitive answer, so that the matter be forever settled :).
Alexandru Tabusca
core
Verifiable Public Key Encryption Scheme With Equality Test in 5G Networks
The emergence of 5G networks will allow cloud computing providers to offer more convenient services. However, security and privacy issues of cloud services in 5G networks represent huge challenges.
Yan Xu +5 more
semanticscholar +1 more source
Public Key Infrastructure based on Authentication of Media Attestments [PDF]
Many users would prefer the privacy of end-to-end encryption in their online communications if it can be done without significant inconvenience. However, because existing key distribution methods cannot be fully trusted enough for automatic use, key ...
Heinrich, Stuart
core
How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption. [PDF]
Wang J, Ling C.
europepmc +1 more source
Server-Aided Public Key Encryption With Keyword Search
Public key encryption with keyword search (PEKS) is a well-known cryptographic primitive for secure searchable data encryption in cloud storage. Unfortunately, it is inherently subject to the (inside) offline keyword guessing attack (KGA), which is ...
Rongmao Chen +6 more
semanticscholar +1 more source
Anonymous and Adaptively Secure Revocable IBE with Constant Size Public Parameters [PDF]
In Identity-Based Encryption (IBE) systems, key revocation is non-trivial. This is because a user's identity is itself a public key. Moreover, the private key corresponding to the identity needs to be obtained from a trusted key authority through an ...
Chen, Jie +4 more
core
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM [PDF]
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of applications, in particular, as an essential building block for two-party and multi-party computation.
Barreto, Paulo S. L. M. +4 more
core +1 more source
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
We present several new and fairly practical public-key encryption schemes and prove them secure against adaptive chosen ciphertext attack. One scheme is based on Paillier's Decision Composite Residuosity assumption, while another is based in the ...
R. Cramer, V. Shoup
semanticscholar +1 more source
Cryptanalysis of a Proposal Based on the Discrete Logarithm Problem Inside Sn
In 2008, Doliskani et al. proposed an ElGamal-style encryption scheme using the symmetric group Sn as mathematical platform. In 2012, an improvement of the cryptosystem’s memory requirements was suggested by Othman. The proposal by Doliskani et al.
María Isabel González Vasco +2 more
doaj +1 more source
Data security and confidentiality is one of the most important aspects of information systems at the moment. One attempt to secure data such as by using cryptography.
Aryanti Aryanti, Mekongga Ikhthison
doaj +1 more source

