scispace - formally typeset
Search or ask a question
Topic

40-bit encryption

About: 40-bit encryption is a research topic. Over the lifetime, 5434 publications have been published within this topic receiving 149016 citations.


Papers
More filters
Book ChapterDOI
09 Oct 2015

71 citations

Book ChapterDOI
09 Jul 2012
TL;DR: This paper adopts multiple trapdoors from the Agrawal-Boneh-Boyen and Gentry-Peikerty-Vaikuntanathan lattice IBE schemes to realize key revocation, which in turn, makes use of binary-tree data structure.
Abstract: In this paper, we present an identity-based encryption (IBE) scheme from lattices with efficient key revocation. We adopt multiple trapdoors from the Agrawal-Boneh-Boyen and Gentry-Peikerty-Vaikuntanathan lattice IBE schemes to realize key revocation, which in turn, makes use of binary-tree data structure. Using our scheme, key update requires logarithmic complexity in the maximal number of users and linear in the number of revoked users for the relevant key authority. We prove that our scheme is selective secure in the standard model and under the LWE assumption, which is as hard as the worst-case approximating short vectors on arbitrary lattices.

71 citations

Patent
27 Mar 2001
TL;DR: In this paper, a system, method and computer program product are provided for utilizing encrypter hardware with a server, which is capable of selecting an encryption algorithm from a library of encryption algorithms.
Abstract: A system, method and computer program product are provided for utilizing encrypter hardware with a server. Initially, an encryption layer module is run on a server. Such encryption layer module is capable of selecting an encryption algorithm from a library of encryption algorithms. In operation, the encryption layer module offloads a host processor of the server by executing the selected encryption algorithm using dedicated encrypter hardware.

70 citations

Proceedings Article
01 Jan 2005
TL;DR: This paper presents an efficient and lightweight implementation of public-key cryptography algorithms relying on elliptic curves, running on Atmels popular 8Bit ATMEGA128 microcontroller, the heart of the MICA2 platform.
Abstract: One of the huge problems for security in sensor networks is the lack of resources. Based on microcontroller architectures with severe limited computing abilities, strong public-key cryptography is commonly seen as infeasible on sensor devices. In contrast to this prejudice this paper presents an efficient and lightweight implementation of public-key cryptography algorithms relying on elliptic curves. The code is running on Atmels popular 8Bit ATMEGA128 microcontroller, the heart of the MICA2 platform.

70 citations

Proceedings ArticleDOI
03 Nov 2014
TL;DR: This work introduces a new cryptographic tool called Controlled Functional Encryption (C-FE), which allows a user (client) to learn only certain functions of encrypted data, using keys obtained from an authority.
Abstract: Motivated by privacy and usability requirements in various scenarios where existing cryptographic tools (like secure multi-party computation and functional encryption) are not adequate, we introduce a new cryptographic tool called Controlled Functional Encryption (C-FE). As in functional encryption, C-FE allows a user (client) to learn only certain functions of encrypted data, using keys obtained from an authority. However, we allow (and require) the client to send a fresh key request to the authority every time it wants to evaluate a function on a ciphertext. We obtain efficient solutions by carefully combining CCA2 secure public-key encryption (or rerandomizable RCCA secure public-key encryption, depending on the nature of security desired) with Yao's garbled circuit. Our main contributions in this work include developing and for- mally defining the notion of C-FE; designing theoretical and practical constructions of C-FE schemes achieving these definitions for specific and general classes of functions; and evaluating the performance of our constructions on various application scenarios.

70 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Cryptography
37.3K papers, 854.5K citations
89% related
Authentication
74.7K papers, 867.1K citations
86% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
81% related
Wireless ad hoc network
49K papers, 1.1M citations
80% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202370
2022145
20213
20205
20194