A public-key encryption scheme provides a provable security against adaptive-chosen-ciphertext-attacks (ACCA) and reduces the length of a ciphertext in a public-key encryption system. For the above purposes, the public-key encryption scheme is based on a weaker assumption, a computational Diffie...
Public-key encryption (also called asymmetric encryption) involves a pair of keys—a public key and a private key—associated with an entity that needs to authenticate its identity electronically or to sign or encrypt data. Each public key is published, and the corresponding private key is kept...
Secure key-evolving for public key cryptosystems based on the discrete logarithm problem This paper addresses the security and efficiency of key-evolving protocols in public key encryption and signature schemes, where the security assumption is... FL Cheng,SP Shieh - 《Journal of Information Science...
A New Image Encryption Algorithm Based on One-Dimensional Polynomial Chaotic Maps In recent years, a growing number of cryptosystems based on chaos have been proposed, however, most of them encounter with some problems such as: low level of security and small key space. Chaotic maps have good ...
In this paper, we construct a PKES scheme based on factoring, it's computational efficient and secure. The public parameters in our scheme is also short, we just need a public modules and a random element of the set of integers. 展开 关键词: factoring public key searchable encryption ...
Rabin's Cryptosystem is considered one example of this type, which is based on using the square order (quadratic equation) in encryption function. Many cryptosystems (since 1978) were implemented under such a mathematical approach. This chapter provides an illustration of the variants of RSA-Public...
This paper addresses the security of public-key cryptosystems in a "multi-user" setting, namely in the presence of attacks involving the encryption of related messages under different public keys, as exemplified by Hstad's classical attacks on RSA. We prove that security in the single-user sett...
百度试题 结果1 题目 英语翻译The RSA transform has been the basis of dozens of public-key encryption schemes and digital signature schemes, 相关知识点: 试题来源: 解析 RSA转换已经成为数十个公钥加密方案和数字签名方案的基础. 反馈 收藏
On the Security of a Certificateless Public-Key Encryption Certificateless public-key cryptosystem is a recently proposed attractive paradigm using public key cryptosystem, which avoids the key escrow inherent in identity-based public-key cryptosystems, and does not need certificates to generate... Z Zh...
On Multiple Encryption for Public-Key Cryptography Using multiple, individual encryption schemes is a well-established method to increase the overall security of encrypted data. These so-called multiple enc... T Soroceanu,N Buchmann,M Margraf - Cryptography (2410-387X) 被引量: 0发表: 2023年 ...