Articles with "public key" as a keyword



Photo from wikipedia

Post-Quantum Secure Inner Product Functional Encryption Using Multivariate Public Key Cryptography

Sign Up to like & get
recommendations!
Published in 2021 at "Mediterranean Journal of Mathematics"

DOI: 10.1007/s00009-021-01841-2

Abstract: Functional encryption (FE) is an exciting new public key paradigm that provides solutions to most of the security challenges of cloud computing in a non-interactive manner. In the context of FE, inner product functional encryption… read more here.

Keywords: post quantum; public key; mathbf; cryptography ... See more keywords
Photo from wikipedia

A secure key authentication scheme for cryptosystems based on GDLP and IFP

Sign Up to like & get
recommendations!
Published in 2017 at "Soft Computing"

DOI: 10.1007/s00500-016-2440-3

Abstract: The advancement of public-key cryptography in recent years has offered strong background support for the invention of numerous new system applications vastly employed in electronic business as well as other fields. However, that does not… read more here.

Keywords: key authentication; authentication scheme; authentication; public key ... See more keywords
Photo from archive.org

Quantum Public Key Cryptosystem Based on Bell States

Sign Up to like & get
recommendations!
Published in 2017 at "International Journal of Theoretical Physics"

DOI: 10.1007/s10773-017-3506-4

Abstract: Classical public key cryptosystems (PKC), such as RSA, EIGamal, ECC, are no longer secure in quantum algorithms, and quantum cryptography has become a novel research topic. In this paper we present a quantum asymmetrical cryptosystem… read more here.

Keywords: key; bell states; quantum public; key cryptosystem ... See more keywords
Photo from wikipedia

Quantum public-key signature scheme based on asymmetric quantum encryption with trapdoor information

Sign Up to like & get
recommendations!
Published in 2020 at "Quantum Information Processing"

DOI: 10.1007/s11128-020-02736-z

Abstract: Based on the quantum asymmetric encryption with trapdoor information, a quantum public-key signature scheme is proposed. In our scheme, the signer signs a message with his/her private key, while the verifier verifies the quantum signature… read more here.

Keywords: quantum; information; quantum public; scheme ... See more keywords
Photo by hudsoncrafted from unsplash

Efficient Chosen-Ciphertext Secure Encryption from R-LWE

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-017-3979-8

Abstract: In order to construct efficient public-key encryption scheme that is secure against adaptive chosen-ciphertext attacks (CCA), an efficient signature scheme and an identity-based encryption (IBE) scheme from the learning with errors over rings are presented… read more here.

Keywords: secure; scheme; chosen ciphertext; encryption ... See more keywords
Photo from wikipedia

Trapdoor Security Lattice-Based Public-Key Searchable Encryption with a Designated Cloud Server

Sign Up to like & get
recommendations!
Published in 2018 at "Wireless Personal Communications"

DOI: 10.1007/s11277-018-5357-6

Abstract: Cloud storage technique has becoming increasingly significant in cloud service platform. Before choosing to outsource sensitive data to the cloud server, most of cloud users need to encrypt the important data ahead of time. Recently,… read more here.

Keywords: searchable encryption; public key; key searchable; cloud server ... See more keywords
Photo by thinkmagically from unsplash

E-commerce payment model using blockchain

Sign Up to like & get
recommendations!
Published in 2022 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-020-02519-5

Abstract: The current e-commerce payment systems for credit or check cards require a payment gateway (PG). This incurs PG fees, which in turn increases the cost of engaging in e-commerce. This paper proposes a simple payment… read more here.

Keywords: public key; payment model; commerce payment; payment ... See more keywords
Photo from wikipedia

Optical encryption based on ghost imaging and public key cryptography

Sign Up to like & get
recommendations!
Published in 2018 at "Optics and Lasers in Engineering"

DOI: 10.1016/j.optlaseng.2018.07.014

Abstract: Abstract In this paper, according to the phase object in the ghost imaging has a stealth effect, we proposed an optical encryption method based on compressive ghost imaging and public key cryptography. This method solves… read more here.

Keywords: optical encryption; encryption; imaging public; public key ... See more keywords
Photo by hudsoncrafted from unsplash

An Efficient Public Key Encryption Scheme Based on QC-MDPC Lattices

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Access"

DOI: 10.1109/access.2017.2765538

Abstract: In this paper, we introduce a new family of lattices, namely QC-MDPC lattices, which are a special case of LDPC lattices, and an improved bit flipping algorithm for decoding of these lattices. Encoding and decoding… read more here.

Keywords: key encryption; encryption scheme; scheme; encryption ... See more keywords
Photo from wikipedia

Public Key Authenticated Encryption With Designated Equality Test and its Applications in Diagnostic Related Groups

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2940646

Abstract: Due to the massive growth of data and security concerns, data of patients would be encrypted and outsourced to the cloud server for feature matching in various medical scenarios, such as personal health record systems,… read more here.

Keywords: related groups; public key; diagnostic related; equality test ... See more keywords
Photo from wikipedia

VCLPKES: Verifiable Certificateless Public Key Searchable Encryption Scheme for Industrial Internet of Things

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2968501

Abstract: Nowadays the data of the industrial Internet of Things (IIOT) have been stored in cloud servers. The security and privacy of stored data have been hot research topics. The technique of public key searchable encryption… read more here.

Keywords: public key; key searchable; scheme; searchable encryption ... See more keywords