We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. An approach for designing fast public key encryption systems using white-box cryptography techniques

    I present an approach for designing fast public key encryption cryptosystems using random primitives, white-box cryptography techniques and...

    Article 10 February 2024
  2. A new lightweight public key encryption with equality test for cloud storage

    Public key encryption with equality test (PKEET) can test if two ciphertexts generated from different public keys contain the same message without...

    Hao Lin, Gaohua Zhao, ... Wei Jiang in Multimedia Tools and Applications
    Article 09 September 2023
  3. TFHE Public-Key Encryption Revisited

    Fully homomorphic encryption allows directly processing encrypted data without having to decrypt it. The result of the computation is encrypted,...
    Conference paper 2024
  4. Quantum-resistant public-key encryption and signature schemes with smaller key sizes

    The emergence of new complex technologies, such as cloud and quantum computing, has a complicated computational structure, which can compromise the...

    Lacchita Soni, Harish Chandra, ... Ram Keval in Cluster Computing
    Article 30 December 2022
  5. BASPED: Blockchain assisted searchable public key encryption over outsourced data

    Outsourcing data to the cloud is now a common practice in many organizations to reduce data storage and maintenance costs. Outsourced data is stored...

    Partha Sarathi Chakraborty, Somanath Tripathy, Sanjeet Kumar Nayak in International Journal of Information Security
    Article 20 September 2023
  6. RLWE-based public key searchable encryption: securer, faster, and lower end-to-end delay for cloud computing

    Cloud storage and computing offer significant convenience and management efficiency in the information era. Privacy protection is a major challenge...

    Lijun Qi, **cheng Zhuang in The Journal of Supercomputing
    Article 21 August 2023
  7. Polar coding for Ring-LWE-based public key encryption

    The ring learning with errors (RLWE) problem can be used to construct efficient post-quantum public key encryption schemes. An error distribution,...

    Jiabo Wang, Cong Ling in Cryptography and Communications
    Article Open access 24 September 2022
  8. Updatable Public-Key Encryption, Revisited

    We revisit Updatable Public-Key Encryption (UPKE), which was introduced as a practical mechanism for building forward-secure cryptographic protocols....
    Joël Alwen, Georg Fuchsbauer, Marta Mularczyk in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  9. Public-Key Encryption with Quantum Keys

    In the framework of Impagliazzo’s five worlds, a distinction is often made between two worlds, one where public-key encryption exists (Cryptomania),...
    Khashayar Barooti, Alex B. Grilo, ... Michael Walter in Theory of Cryptography
    Conference paper 2023
  10. Revisiting Anonymity in Post-quantum Public Key Encryption

    This paper revisits the anonymity of post-quantum public key encryption in the presence of CCA attacks (ANO-CCA). Specifically, we demonstrate the...
    Yao Cheng, **anhui Lu, ... Bao Li in Post-Quantum Cryptography
    Conference paper 2024
  11. Two-Message Authenticated Key Exchange from Public-Key Encryption

    In two-message authenticated key exchange (AKE), it is necessary for the initiator to keep a round state after sending the first round-message,...
    You Lyu, Shengli Liu in Computer Security – ESORICS 2023
    Conference paper 2024
  12. SoK: Public Key Encryption with Openings

    When modelling how public key encryption can enable secure communication, we should acknowledge that secret information, such as private keys or the...
    Carlo Brunetta, Hans Heum, Martijn Stam in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  13. Public Key Encryption with Secure Key Leasing

    We introduce the notion of public key encryption with secure key leasing (PKE-SKL). Our notion supports the leasing of decryption keys so that a...
    Shweta Agrawal, Fuyuki Kitagawa, ... Takashi Yamakawa in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
  14. An Effective and enhanced RSA based Public Key Encryption Scheme (XRSA)

    Cryptography is the mechanism of providing significant security services such as confidentiality, authentication, and integrity. These services are...

    Raza Imam, Faisal Anwer, Mohammad Nadeem in International Journal of Information Technology
    Article 22 June 2022
  15. Multi-instance Secure Public-Key Encryption

    Mass surveillance targets many users at the same time with the goal of learning as much as possible. Intuitively, breaking many users’ cryptography...
    Carlo Brunetta, Hans Heum, Martijn Stam in Public-Key Cryptography – PKC 2023
    Conference paper 2023
  16. An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability

    In the cloud, users prefer to store their sensitive data in encrypted form. Searching keywords over encrypted data without loss of data...

    Junling Guo, Lidong Han, ... Chengliang Tian in Journal of Cloud Computing
    Article Open access 03 June 2022
  17. Multi-recipient Public-Key Authenticated Encryption with Keyword Search

    In cloud computing, private data is usually encrypted and uploaded to a cloud server, which is possibly available to multiple recipients. The...
    Ke** He, Sha Ma, Hao Wang in Intelligence Computation and Applications
    Conference paper 2024
  18. A probabilistic public key encryption switching scheme for secure cloud storage

    The high demand for user-centric applications such as secure cloud storage laid the foundation for the development of user-centric security schemes...

    Radhakrishna Bhat, N. R. Sunitha, S. S. Iyengar in International Journal of Information Technology
    Article Open access 21 September 2022
  19. Backward-Leak Uni-Directional Updatable Encryption from (Homomorphic) Public Key Encryption

    The understanding of directionality for updatable encryption (UE) schemes is important, but not yet completed in the literature. We show that...
    Yao Jiang Galteland, Jiaxin Pan in Public-Key Cryptography – PKC 2023
    Conference paper 2023
Did you find what you were looking for? Share feedback.