Articles with "key encryption" as a keyword



Photo by hudsoncrafted from unsplash

An Efficient Public Key Encryption Scheme Based on QC-MDPC Lattices

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Access"

DOI: 10.1109/access.2017.2765538

Abstract: In this paper, we introduce a new family of lattices, namely QC-MDPC lattices, which are a special case of LDPC lattices, and an improved bit flipping algorithm for decoding of these lattices. Encoding and decoding… read more here.

Keywords: key encryption; encryption scheme; scheme; encryption ... See more keywords
Photo by drew_hays from unsplash

Pairing-Free for Public Key Encryption With Equality Test Scheme

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3081709

Abstract: The modular exponentiation has been proved better in terms of computational efficiency as compared to bilinear pairing. Therefore, discrete logarithm, a concept of modular exponentiation may be incorporated to present improved security schemes. With this… read more here.

Keywords: public key; scheme; test; equality test ... See more keywords
Photo from wikipedia

A Survey of Public-Key Encryption With Search Functionality for Cloud-Assisted IoT

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3109440

Abstract: Nowadays, Internet of Things (IoT) is an attractive system to provide broad connectivity of a wide range of applications, and clouds are natural promoters. Cloud-assisted IoT combines the advantages of cloud computing and IoT, which… read more here.

Keywords: key encryption; encryption; survey; pke ... See more keywords
Photo by headwayio from unsplash

Symmetric Volatile Shared Key Encryption: A Two-way Communication Shared Key Encryption

Sign Up to like & get
recommendations!
Published in 2017 at "Mathematics in Computer Science"

DOI: 10.11648/j.mcs.20170203.11

Abstract: When it comes to the subject of encryption of communication streams, two key exchange methods are widely used asymmetric and symmetric key algorithms. However, neither of these methods is perfect. This paper will an algorithm… read more here.

Keywords: key encryption; symmetric volatile; communication; shared key ... See more keywords
Photo from academic.microsoft.com

Normalized Unconditional ϵ-Security of Private-Key Encryption

Sign Up to like & get
recommendations!
Published in 2017 at "Entropy"

DOI: 10.3390/e19030100

Abstract: In this paper we introduce two normalized versions of non-perfect security for private-key encryption: one version in the framework of Shannon entropy, another version in the framework of Kolmogorov complexity. We prove the lower bound… read more here.

Keywords: key encryption; private key; security; normalized unconditional ... See more keywords
Photo by drew_hays from unsplash

Traceable Scheme of Public Key Encryption with Equality Test

Sign Up to like & get
recommendations!
Published in 2022 at "Entropy"

DOI: 10.3390/e24030309

Abstract: Public key encryption supporting equality test (PKEwET) schemes, because of their special function, have good applications in many fields, such as in cloud computing services, blockchain, and the Internet of Things. The original PKEwET has… read more here.

Keywords: equality test; key encryption; equality; scheme ... See more keywords
Photo from wikipedia

Symmetric Key Encryption Based on Rotation-Translation Equation

Sign Up to like & get
recommendations!
Published in 2020 at "Symmetry"

DOI: 10.3390/sym12010073

Abstract: In this paper, an improved encryption algorithm based on numerical methods and rotation–translation equation is proposed. We develop the new encryption-decryption algorithm by using the concept of symmetric key instead of public key. Symmetric key… read more here.

Keywords: key encryption; rotation translation; encryption; symmetric key ... See more keywords
Photo from wikipedia

Security Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel

Sign Up to like & get
recommendations!
Published in 2022 at "Symmetry"

DOI: 10.3390/sym14081709

Abstract: An instance of the framework for cryptographic security enhancement of symmetric-key encryption employing a dedicated error correction encoding is addressed. The main components of the proposal are: (i) a dedicated error correction coding and (ii)… read more here.

Keywords: key encryption; encryption; security; symmetric key ... See more keywords