Search
Search Results
-
An approach for designing fast public key encryption systems using white-box cryptography techniques
I present an approach for designing fast public key encryption cryptosystems using random primitives, white-box cryptography techniques and...
-
A new lightweight public key encryption with equality test for cloud storage
Public key encryption with equality test (PKEET) can test if two ciphertexts generated from different public keys contain the same message without...
-
TFHE Public-Key Encryption Revisited
Fully homomorphic encryption allows directly processing encrypted data without having to decrypt it. The result of the computation is encrypted,... -
Quantum-resistant public-key encryption and signature schemes with smaller key sizes
The emergence of new complex technologies, such as cloud and quantum computing, has a complicated computational structure, which can compromise the...
-
BASPED: Blockchain assisted searchable public key encryption over outsourced data
Outsourcing data to the cloud is now a common practice in many organizations to reduce data storage and maintenance costs. Outsourced data is stored...
-
RLWE-based public key searchable encryption: securer, faster, and lower end-to-end delay for cloud computing
Cloud storage and computing offer significant convenience and management efficiency in the information era. Privacy protection is a major challenge...
-
Polar coding for Ring-LWE-based public key encryption
The ring learning with errors (RLWE) problem can be used to construct efficient post-quantum public key encryption schemes. An error distribution,...
-
Updatable Public-Key Encryption, Revisited
We revisit Updatable Public-Key Encryption (UPKE), which was introduced as a practical mechanism for building forward-secure cryptographic protocols.... -
Public-Key Encryption with Quantum Keys
In the framework of Impagliazzo’s five worlds, a distinction is often made between two worlds, one where public-key encryption exists (Cryptomania),... -
Revisiting Anonymity in Post-quantum Public Key Encryption
This paper revisits the anonymity of post-quantum public key encryption in the presence of CCA attacks (ANO-CCA). Specifically, we demonstrate the... -
Two-Message Authenticated Key Exchange from Public-Key Encryption
In two-message authenticated key exchange (AKE), it is necessary for the initiator to keep a round state after sending the first round-message,... -
SoK: Public Key Encryption with Openings
When modelling how public key encryption can enable secure communication, we should acknowledge that secret information, such as private keys or the... -
Public Key Encryption with Secure Key Leasing
We introduce the notion of public key encryption with secure key leasing (PKE-SKL). Our notion supports the leasing of decryption keys so that a... -
An Effective and enhanced RSA based Public Key Encryption Scheme (XRSA)
Cryptography is the mechanism of providing significant security services such as confidentiality, authentication, and integrity. These services are...
-
Multi-instance Secure Public-Key Encryption
Mass surveillance targets many users at the same time with the goal of learning as much as possible. Intuitively, breaking many users’ cryptography... -
An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability
In the cloud, users prefer to store their sensitive data in encrypted form. Searching keywords over encrypted data without loss of data...
-
Multi-recipient Public-Key Authenticated Encryption with Keyword Search
In cloud computing, private data is usually encrypted and uploaded to a cloud server, which is possibly available to multiple recipients. The... -
A probabilistic public key encryption switching scheme for secure cloud storage
The high demand for user-centric applications such as secure cloud storage laid the foundation for the development of user-centric security schemes...
-
Backward-Leak Uni-Directional Updatable Encryption from (Homomorphic) Public Key Encryption
The understanding of directionality for updatable encryption (UE) schemes is important, but not yet completed in the literature. We show that... -