نتایج جستجو برای: private key cryptosystem

تعداد نتایج: 645641  

2011
Hayam K. Al-Anie Mohammad A. Alia Adnan A. Hnaif

In this paper we propose a new secure E-Voting protocol based on public-key encryption cryptosystem. This protocol is summarized in three processes: firstly, access control process which involves the identification and authentication phases for the applied citizens. Secondly, the voting process which will be done by ciphering the voter information using public-key encryption cryptosystem (RSA),...

Journal: :Applied Mathematics & Information Sciences 2014

2001
Amr M. Youssef Guang Gong

At ACISP 2000, Yoo et al proposed a fast public key cryptosystem using matrices over a ring. The authors claim that the security of their system is based on the RSA problem. In this paper we present a heuristic attack that enables us to recover the private key from the public key. In particular, we show that breaking the system can be reduced to finding a short vector in a lattice which can be ...

2010
Helger Lipmaa Bingsheng Zhang

Assume that a client outsources his database to a remote storage-provider (the server), so that for privacy reasons, the client’s database is encrypted by his secret key. During a PIR-writing protocol, the client updates one element of the encrypted database without revealing to the semi-honest server which element was updated and, of course, to which value. The best previous PIR-writing protoc...

Journal: :IACR Cryptology ePrint Archive 2010
Debiao He Jianhua Chen Jin Hu

Recently, Yoon et al. and Wu proposed two improved remote mutual authentication and key agreement schemes for mobile devices on elliptic curve cryptosystem. In this paper, we show that Yoon et al.’s protocol fails to provide explicit key perfect forward secrecy and fails to achieve explicit key confirmation. We also point out Wu’s scheme decreases efficiency by using the double secret keys and ...

Journal: :CoRR 2000
Lek-Heng Lim

We show that the Cao-Li cryptosystem proposed in [1] is not secure. Its private key can be reconstructed from its public key using elementary means such as LU-decomposition and Euclidean algorithm. The Cao-Li public key cryptosystem was first proposed in [1]. It encrypts messages using a bilinear form that is chosen to permit easy decryption by the Chinese remainder theorem. Public key cryptosy...

Journal: :Trends in Sciences 2022

The algorithms such as RSA, ElGamal and ECC work on integers. Commutative operations integer multiplication leave these vulnerable to attack by eavesdroppers. For this reason, experts develop the concept of non-commutative algebra in public key cryptosystem adding properties groups, semirings, semiring division, matrices matrix decomposition. However, generating process some cryptosystems is qu...

2016
Richard Winton

Cryptosystems may be classified as either public key or private key. The system developed in this paper combines the protocols of these two types of cryptography. Techniques and characteristics of previously established cryptosystems are employed as well to produce a three-pass system that is more secure than these earlier systems. Each transmission in the correspondence protocol is at least tr...

2005
C. A. Hoggins C. D’Alessandro D. J. Kinniment A. Yakovlev

Cryptosystem designers frequently assume that secrets will be manipulated in closed, reliable computing environments. Unfortunately, actual microchips leak information about the operations they process. Cryptosystems often take slightly different amounts of time to process different inputs and also internal signals. By carefully measuring the amount of time required to perform private key opera...

2017
Göran Pulkkis Kaj Grahn Jonny Karlsson

Identity Based Encryption (IBE) is a public key cryptosystem where a unique identity string, such as an e-mail address, can be used as a public key. IBE is simpler than the traditional PKI since certificates are not needed. An IBE scheme is usually based on pairing of discrete points on elliptic curves. An IBE scheme can also be based on quadratic residuosity. This paper presents an overview of...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید