Results 81 to 90 of about 615,663 (220)
Improved Homomorphic Discrete Fourier Transforms and FHE Bootstrapping
Homomorphic encryption (HE), which enables computation on ciphertexts without any leakage, rise as a most promising solution for privacy-preserving data processing, including secure machine learning and secure out-sourcing computation.
Kyoohyung Han +2 more
doaj +1 more source
Quantum public-key encryption protocol based on single-photon
A quantum public-key encryption protocol based on single-photon was provided.Pseudo random sequence mapping to private keys to implement corresponding quantum operations and then obtaining quantum public-key to encode the plaintext was used.Employ the ...
Wen-jun LUO, Guan-li LIU
doaj +2 more sources
Provably secure and efficient escrowable public key encryption schemes
In an escrowable public key encryption (E-PKE) scheme, there are two keys associated with one public key. It can reduce the total number of certificates in the public key infrastructure (PKI) to a large extent, thus degrade the com-plexity of certificate
Wen-hao LIU +3 more
doaj +2 more sources
A Multi-User Public Key Encryption with Multi-Keyword Search out of Bilinear Pairings. [PDF]
Zhang S, Wen Q, Li W, Zhang H, Jin Z.
europepmc +1 more source
Public Key Encryption with Keyword Search
D. Boneh +3 more
semanticscholar +1 more source
Novel construction of forward-secure public-key encryption in the standard model
All existing provably secure forward-secure public-key encryption schemes in the literature were only proven to be chosen-plaintext secure. A novel forward-secure public-key encryption scheme without random oracles was pro-posed.
Yang LU, Ji-guo LI
doaj +2 more sources
We propose a public key encryption cryptosystem based on solutions of linear equation systems with predefinition of input parameters through shared secret computation for factorizable substitutions. The existence of multiple equivalent solutions for an underdetermined system of linear equations determines the impossibility of its resolution by a ...
Khalimov, Gennady, Kotukh, Yevgen
openaire +2 more sources
Application of differential cryptography to a GN authentication hierarchy scheme
Starting from the classical differential cryptography, we describe how to construct particular parameters for elliptic curves with application to the domain of information security. These results conclude to a key used on symmetrical encryption.
Alin Ionut Golumbeanu
doaj
Compact FPGA hardware architecture for public key encryption in embedded devices. [PDF]
RodrÃguez-Flores L +4 more
europepmc +1 more source

