Results 81 to 90 of about 615,663 (220)

Improved Homomorphic Discrete Fourier Transforms and FHE Bootstrapping

open access: yesIEEE Access, 2019
Homomorphic encryption (HE), which enables computation on ciphertexts without any leakage, rise as a most promising solution for privacy-preserving data processing, including secure machine learning and secure out-sourcing computation.
Kyoohyung Han   +2 more
doaj   +1 more source

Quantum public-key encryption protocol based on single-photon

open access: yesTongxin xuebao, 2014
A quantum public-key encryption protocol based on single-photon was provided.Pseudo random sequence mapping to private keys to implement corresponding quantum operations and then obtaining quantum public-key to encode the plaintext was used.Employ the ...
Wen-jun LUO, Guan-li LIU
doaj   +2 more sources

Provably secure and efficient escrowable public key encryption schemes

open access: yesTongxin xuebao, 2014
In an escrowable public key encryption (E-PKE) scheme, there are two keys associated with one public key. It can reduce the total number of certificates in the public key infrastructure (PKI) to a large extent, thus degrade the com-plexity of certificate
Wen-hao LIU   +3 more
doaj   +2 more sources

Public Key Encryption with Keyword Search

open access: yesInternational Conference on the Theory and Application of Cryptographic Techniques, 2004
D. Boneh   +3 more
semanticscholar   +1 more source

Novel construction of forward-secure public-key encryption in the standard model

open access: yesTongxin xuebao, 2014
All existing provably secure forward-secure public-key encryption schemes in the literature were only proven to be chosen-plaintext secure. A novel forward-secure public-key encryption scheme without random oracles was pro-posed.
Yang LU, Ji-guo LI
doaj   +2 more sources

LINE: Public-key encryption

open access: yes
We propose a public key encryption cryptosystem based on solutions of linear equation systems with predefinition of input parameters through shared secret computation for factorizable substitutions. The existence of multiple equivalent solutions for an underdetermined system of linear equations determines the impossibility of its resolution by a ...
Khalimov, Gennady, Kotukh, Yevgen
openaire   +2 more sources

Application of differential cryptography to a GN authentication hierarchy scheme

open access: yesElectronic Journal of Differential Equations, 2017
Starting from the classical differential cryptography, we describe how to construct particular parameters for elliptic curves with application to the domain of information security. These results conclude to a key used on symmetrical encryption.
Alin Ionut Golumbeanu
doaj  

Compact FPGA hardware architecture for public key encryption in embedded devices. [PDF]

open access: yesPLoS One, 2018
Rodríguez-Flores L   +4 more
europepmc   +1 more source

Public-Key Encryption from Homogeneous CLWE

open access: yes, 2022
Andrej Bogdanov   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy