نتایج جستجو برای: private key cryptosystem

تعداد نتایج: 645641  

2012
Nazrul M. Ahmad Asrul H. Yaacob Ridza Fauzi Alireza Khorram

Elliptic curve-based certificateless signature is slowly gaining attention due to its ability to retain the efficiency of identity-based signature to eliminate the need of certificate management while it does not suffer from inherent private key escrow problem. Generally, cryptosystem based on elliptic curve offers equivalent security strength at smaller key sizes compared to conventional crypt...

2003

We introduce a new cryptographic technique that we call universal re-encryption. A conventional cryptosystem that permits re-encryption, such as ElGamal, does so only for a player with knowledge of the public key corresponding to a given ciphertext. In contrast, universal reencryption may be performed without knowledge of public keys. We demonstrate an asymmetric cryptosystem with universal re-...

2001
Jeffrey Hoffstein Jill Pipher Joseph H. Silverman

The purpose of this paper is to submit the NSS lattice based signature scheme for consideration for inclusion in the IEEE P1363.1 standard. At the rump session of CRYPTO ’96 the authors introduced a highly efficient new public key cryptosystem called NTRU. (See [4] for details.) Underlying NTRU is a hard mathematical problem of finding short vectors in certain lattices. In this paper we introdu...

Journal: :Inf. Manag. Comput. Security 2002
Hao Feng Chan Choong Wah

n recent years, public key infrastructure (PKI) has emerged as co-existent with the increasing demand for digital security. A digital signature is created using existing public key cryptography technology. This technology will permit commercial transactions to be carried out across insecure networks without fear of tampering or forgery. The relative strength of digital signatures relies on the ...

Journal: :Theor. Comput. Sci. 2012
Chunqiang Hu Xiaofeng Liao Xiuzhen Cheng

In verifiable multi-secret sharing schemes (VMSSs), many secrets can be shared but only one share is kept by each user and this share is verifiable by others. In this paper, we propose two secure, efficient, and verifiable (t, n) multi-secret sharing schemes, namely Scheme-I and Scheme-II. Scheme-I is based on the Lagrange interpolating polynomial and the LFSR-based public key cryptosystem. The...

1996
Don Davis

Public-key cryptography has low infrastructural overhead because public-key users bear a substantial but hidden administrative burden. A public-key security system trusts its users to validate each others' public keys rigorously and to manage their own private keys securely. Both tasks are hard to do well, but publickey security systems lack a centralized infrastructure for enforcing users' dis...

Journal: :Quantum Information & Computation 2012
Hachiro Fujita

The McEliece cryptosystem is one of the best-known (classical) public-key cryptosystems, which is based on algebraic coding theory. In this paper, we present a quantum analogue of the classical McEliece cryptosystem. Our quantumMcEliece public-key cryptosystem is based on the theory of stabilizer codes and has the key generation, encryption and decryption algorithms similar to those in the clas...

2001
Scott A. Crosby Ian Goldberg Robert Johnson Dawn Xiaodong Song David A. Wagner

We describe a practical attack on the High Bandwidth Digital Content Protection (HDCP) scheme. HDCP is a proposed identity-based cryptosystem for use over the Digital Visual Interface bus, a consumer video bus used in digital VCRs, camcorders, and personal computers. Public/private key pairs are assigned to devices by a trusted authority, which possesses a master secret. If an attacker can reco...

2016
Md. Hussain Ansari Deepak Kumar Khustar Ansari

This paper studies a public key generation in an enhanced ECC (Elliptic Curve Cryptosystem) using FPGA’s at the hardware implementation. To improve the strength of encryption and the speed of processing, the public key and the private key of EC(Elliptic curve) over GF(2n ) are used to form a shared private key (X,Y). And then the X is used with an initial point on HEC(Hyper-Elliptic Curve) over...

2012
Tai-Chi Lee

This paper proposes a public key generation for an ECC (Elliptic Curve Cryptosystem) using FPGA’s. To improve the strength of encryption and the speed of processing, the public key and the private key of EC(Elliptic curve) over GF(2) are used to form a shared private key (X,Y). And then the X is used with an initial point on HEC(Hyper-Elliptic Curve) over GF(2) to generate session keys, which a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید