We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext

    Threshold public-key encryption (threshold PKE) has various useful applications. A lot of threshold PKE schemes are proposed based on RSA,...

    Kota Takahashi, Keitaro Hashimoto, Wakaha Ogata in Designs, Codes and Cryptography
    Article Open access 12 October 2023
  2. Chosen Ciphertext Security for Blind Identity-Based Encryption with Certified Identities

    Identity-based encryption (IBE) is one of the important extension of public-key encryption (PKE) which can use identities, such as email addresses or...
    Sohto Chiku, Keisuke Hara, Junji Shikata in Information Security Practice and Experience
    Conference paper 2023
  3. TEXCEL: text encryption with elliptic curve cryptography for enhanced security

    Elliptic curve cryptography has emerged as a potent tool for safeguarding data communications. This research paper addresses the problem of...

    P. L. Sharma, Shalini Gupta, ... Arun Kumar Sharma in Multimedia Tools and Applications
    Article 22 May 2024
  4. Reveal the Invisible Secret: Chosen-Ciphertext Side-Channel Attacks on NTRU

    NTRU is a well-known lattice-based cryptosystem that has been selected as one of the four key encapsulation mechanism finalists in Round 3 of NIST’s...
    Zhuang Xu, Owen Pemberton, ... Zhiming Zheng in Smart Card Research and Advanced Applications
    Conference paper 2023
  5. On improved security bounds of one block ciphers mode of operation for protection of block-oriented system storage devices

    In the end of 2022 in Russian Federation recommendations for standardization were adopted defining a block ciphers mode of operation for...

    Georgii Firsov, Alisa Koreneva in Journal of Computer Virology and Hacking Techniques
    Article 03 June 2024
  6. Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption

    Homomorphic encryption (HE) is a useful variant of public key encryption (PKE), but it has a drawback that HE cannot fully achieve IND-CCA2 security,...
    Yusaku Maeda, Koji Nuida in Information Security and Privacy
    Conference paper 2022
  7. CCA Security and Trapdoor Functions via Key-Dependent-Message Security

    We study the relationship among public-key encryption (PKE) satisfying indistinguishability against chosen plaintext attacks (IND-CPA security), that...

    Fuyuki Kitagawa, Takahiro Matsuda, Keisuke Tanaka in Journal of Cryptology
    Article 07 February 2022
  8. Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-quantum Assumptions

    Dual-receiver encryption (DRE) is a special form of public key encryption (PKE) that allows a sender to encrypt a message for two recipients. Without...
    Laurin Benz, Wasilij Beskorovajnov, ... Jörn Müller-Quade in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  9. A New Key Recovery Side-Channel Attack on HQC with Chosen Ciphertext

    Hamming Quasi-Cyclic (HQC) is a code-based candidate of NIST post-quantum standardization procedure. The decoding steps of code-based cryptosystems...
    Guillaume Goy, Antoine Loiseau, Philippe Gaborit in Post-Quantum Cryptography
    Conference paper 2022
  10. Compact Selective Opening Security from LWE

    Selective opening (SO) security is a security notion for public-key encryption schemes that captures security against adaptive corruptions of...
    Dennis Hofheinz, Kristina Hostáková, ... Akin Ünal in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  11. Fault-Enabled Chosen-Ciphertext Attacks on Kyber

    NIST’s PQC standardization process is in the third round, and a first final choice between one of three remaining lattice-based key-encapsulation...
    Julius Hermelink, Peter Pessl, Thomas Pöppelmann in Progress in Cryptology – INDOCRYPT 2021
    Conference paper 2021
  12. Fully Homomorphic Encryption Beyond IND-CCA1 Security: Integrity Through Verifiability

    We focus on the problem of constructing fully homomorphic encryption (FHE) schemes that achieve some meaningful notion of adaptive chosen-ciphertext...
    Mark Manulis, Jérôme Nguyen in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  13. Fully Secure ABE with Outsourced Decryption against Chosen Ciphertext Attack

    Attribute-based encryption (ABE) provides fine-grained access control on encrypted data, but it is not suitable for limited-resource devices due to...
    Ti Wang, Yongbin Zhou, ... Rui Zhang in Information Security and Cryptology
    Conference paper 2021
  14. CryptoHHO: a bio-inspired cryptosystem for data security in Fog–Cloud architecture

    The exponential growth of Internet-of-Things (IoT) has raised several data security risks to the Fog–Cloud architecture. The performance and the...

    Md Saquib Jawed, Mohammad Sajid in The Journal of Supercomputing
    Article 06 April 2024
  15. Lightweight micro-architecture for IoT & FPGA security

    Cryptographic standards were created with the goal of being able to work on a wide range of systems. Small computing systems with limited capacity to...

    Rajdeep Chakraborty, Uttam Kr. Mondal, ... Bibek Bikash Roy in International Journal of Information Technology
    Article 05 September 2023
  16. Decoding the future: exploring and comparing ABE standards for cloud, IoT, blockchain security applications

    Data security poses a significant challenge in cloud computing, the Internet of Things (IoT), and blockchain applications. Attribute-Based Encryption...

    Kranthi Kumar Singamaneni, Kusum Yadav, ... Amandeep Kaur in Multimedia Tools and Applications
    Article 30 May 2024
  17. An approach to enhance the security of unmanned aerial vehicles (UAVs)

    There is a significant surge in unmanned aerial vehicles’ (UAVs) popularity with an ongoing increase in demand due to their multi-functional uses....

    Noshin A. Sabuwala, Rohin D. Daruwala in The Journal of Supercomputing
    Article 12 December 2023
  18. Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3

    The common approach in secure communication channel protocols is to rely on ciphertexts arriving in-order and to close the connection upon any rogue...

    Marc Fischlin, Felix Günther, Christian Janson in Journal of Cryptology
    Article Open access 30 January 2024
  19. Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives

    With the rise of cloud computing, multi-user scenarios have become a common setting for data sharing nowadays. The conservative security notion might...

    Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso in Designs, Codes and Cryptography
    Article 20 January 2024
Did you find what you were looking for? Share feedback.