• No results found

public keys

Signatures  with  Flexible  Public  Key:  Introducing  Equivalence  Classes  for  Public  Keys

Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys

... the public key given to him by the ...a public key that is in some relation R to the public key chosen by the ...possible public keys. A given public key, along with the ...

45

Short  Signatures  With  Short  Public  Keys  From  Homomorphic  Trapdoor  Functions

Short Signatures With Short Public Keys From Homomorphic Trapdoor Functions

... for some cyclotomic polynomial f of degree n, the modulus q ≥ β √ nω( √ log n), and k = O(log q). Q is the number of signatures queries made by the adversary and is its success probability. For those schemes using the ...

18

A  New  Encoding  Framework  for  Predicate  Encryption  with  Non-Linear  Structures  in  Prime  Order  Groups

A New Encoding Framework for Predicate Encryption with Non-Linear Structures in Prime Order Groups

... of public keys and master secret keys of PE schemes, which are also referred to as common variables, must be ...short keys (if CP-ABE) for the first ...

45

Public Auditing for Data Stored on Cloud with Decentralize Access Control

Public Auditing for Data Stored on Cloud with Decentralize Access Control

... utilizing public keys of authenticated users, so that just they can decrypt information utilizing their secret ...secret keys by a key appropriation focus ...in public health records ...

6

Adaptively  Secure  Proxy  Re-encryption

Adaptively Secure Proxy Re-encryption

... a public-key encryp- tion scheme that allows the holder of a key pk to derive a re-encryption key for any other key pk 0 ...users’ public keys and can ask for re-encryption keys and can ...

49

Attribute based Encryption on Secret Verification in Cloud

Attribute based Encryption on Secret Verification in Cloud

... the public and secret key for encryption/decryption and keys for signing/verifying to the ...the keys, the files are encrypted with the two public keys which is issued by KDC using ...

6

SPHINCS:  practical  stateless  hash-based  signatures

SPHINCS: practical stateless hash-based signatures

... Case 4: All the public keys and root nodes are equal, i.e. no difference occurs. We excluded all cases but Case 4 which we analyze now. The analysis consists of a sequence of mutually exclusive cases. ...

30

Bloom  Filter  Encryption   and  Applications  to  Efficient  Forward-Secret 0-RTT  Key  Exchange

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange

... In this paper we introduced the new notion of Bloom filter encryption as a variant of puncturable encryption which tolerates a non-negligible correctness error. We presented various BFKEM constructions. The first one is ...

56

Security Using Ciphertext Policy Attribute Based Access Control: A Literature Survey.

Security Using Ciphertext Policy Attribute Based Access Control: A Literature Survey.

... a public cryptographic ...the public keys and private keys are issued by this authority, which incurs ciphertext size and computation costs in the encryption and decryption operations that ...

5

Disseminated Public-Key Management and Certificate Generation Scheme for MANET

Disseminated Public-Key Management and Certificate Generation Scheme for MANET

... the public key of user f, when it is really the public key of user ...and public keys and bind them by appropriate ...these public keys to issue false certificates and try to ...

5

Efficient  Group  Signature  Scheme  without  Pairings

Efficient Group Signature Scheme without Pairings

... private keys. However, the size of public keys linearly grows with the maximal number N of users in their ...on public key cryptography, which have many useful properties [18]: O(log N )-size ...

36

Secure Member Key Management in Cooperative Group based Communication

Secure Member Key Management in Cooperative Group based Communication

... contains public/private key pair. This public key is certified by the CA but private key is kept only maintain the ...certain public keys indeed belongs to whoever is identified in the ...

6

Repeated Random Enciphering – A Novel Method to Support Data Security on Transit over Networks

Repeated Random Enciphering – A Novel Method to Support Data Security on Transit over Networks

... two keys instead of a single ...the keys are required to complete the process. These two keys are collectively known as the key ...the keys is freely distributable. This key is called the ...

10

A Secure Mobile Banking Scheme based on Certificateless Cryptography in the Standard Security Model

A Secure Mobile Banking Scheme based on Certificateless Cryptography in the Standard Security Model

... user’s public keys Al-Riyami and Paterson[1] introduced a binding technique to bind a user’s pub- lic key with his ...his public key and supplies the KGC his public ...his public key. ...

6

Securing Patient Information in Medical
Databases

Securing Patient Information in Medical Databases

... Attribute-Based Encryption (ABE) was introduced by Sahai and Waters in [31] as a new type of IBE. Sahai and Waters wanted to support IBE by using biometric input as the identity. However, due to the nature of biometrics, ...

81

Comprehensive Secure Data Sharing In Cloud Storage

Comprehensive Secure Data Sharing In Cloud Storage

... new public-key cryptosystems that manufacture constant-size cipher texts specified economical delegation of decipherment rights for any set of cipher texts square measure ...secret keys and build them as ...

7

Key-Aggregate Cryptosystem for Scalable Data Sharing In Cloud Storage

Key-Aggregate Cryptosystem for Scalable Data Sharing In Cloud Storage

... If user wants to upload the data generates the keys and encrypt the using those keys and generates a single aggregate key and sends it to other user. If user wants to download the data, he/she downloads the ...

7

Scalable Data Sharing with Outsourced Revocation in Cloud Computing

Scalable Data Sharing with Outsourced Revocation in Cloud Computing

... of public key encryption in which user can encrypt their data files with the public key but also under the identifier of the ...secret keys for different ...such keys, that is the decryption ...

7

Novel methods for enabling public key schemes in future mobile systems

Novel methods for enabling public key schemes in future mobile systems

... since public key pairs, and certificates have been generated ...phase public key encryption and decryption is performed in the ...of public key pairs and certificates can take place in the mobile ...

5

Dual-layer Video Encryption & Decryption using RSA Algorithm

Dual-layer Video Encryption & Decryption using RSA Algorithm

... known public key cryptosystems for key exchange or digital signatures or encryption of blocks of ...the public and private keys. These two different keys are used for encryption and decryption ...

8

Show all 10000 documents...

Related subjects