scispace - formally typeset


About: Encryption is a(n) research topic. Over the lifetime, 98330 publication(s) have been published within this topic receiving 1451391 citation(s). The topic is also known as: encipherment. more


Open accessJournal ArticleDOI: 10.1145/357980.358017
Abstract: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: (1) Couriers or other secure means are not needed to transmit keys, since a message can be enciphered using an encryption key publicly revealed by the intented recipient. Only he can decipher the message, since only he knows the corresponding decryption key. (2) A message can be “signed” using a privately held decryption key. Anyone can verify this signature using the corresponding publicly revealed encryption key. Signatures cannot be forged, and a signer cannot later deny the validity of his signature. This has obvious applications in “electronic mail” and “electronic funds transfer” systems. A message is encrypted by representing it as a number M, raising M to a publicly specified power e, and then taking the remainder when the result is divided by the publicly specified product, n, of two large secret primer numbers p and q. Decryption is similar; only a different, secret, power d is used, where e * d ≡ 1(mod (p - 1) * (q - 1)). The security of the system rests in part on the difficulty of factoring the published divisor, n. more

Topics: Encryption (66%), Attribute-based encryption (62%), Key (cryptography) (62%) more

14,611 Citations

30 Sep 2010-
Abstract: PROBLEM TO BE SOLVED: To solve the problem, wherein it is impossible for an electronic content information provider to provide commercially secure and effective method, for a configurable general-purpose electronic commercial transaction/distribution control system. SOLUTION: In this system, having at least one protected processing environment for safely controlling at least one portion of decoding of digital information, a secure content distribution method comprises a process for encapsulating digital information in one or more digital containers; a process for encrypting at least a portion of digital information; a process for associating at least partially secure control information for managing interactions with encrypted digital information and/or digital container; a process for delivering one or more digital containers to a digital information user; and a process for using a protected processing environment, for safely controlling at least a portion of the decoding of the digital information. COPYRIGHT: (C)2006,JPO&NCIPI more

Topics: Information assurance (54%), Information security (51%), Encryption (51%)

7,643 Citations

Open accessBook ChapterDOI: 10.1007/3-540-44647-8_13
Dan Boneh1, Matthew K. Franklin2Institutions (2)
19 Aug 2001-
Abstract: We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffie-Hellman problem. Our system is based on the Weil pairing. We give precise definitions for secure identity based encryption schemes and give several applications for such systems. more

Topics: Weil pairing (70%), Functional encryption (68%), ID-based encryption (68%) more

6,596 Citations

Open accessBook ChapterDOI: 10.1007/3-540-48910-X_16
02 May 1999-
Abstract: This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to public-key cryptography. We propose a new trapdoor mechanism and derive from this technique three encryption schemes : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA. Our cryptosystems, based on usual modular arithmetics, are provably secure under appropriate assumptions in the standard model. more

Topics: Probabilistic encryption (66%), Trapdoor function (65%), Paillier cryptosystem (58%) more

6,049 Citations

Journal ArticleDOI: 10.1137/S0097539701398521
Dan Boneh1, Matthew K. Franklin2Institutions (2)
Abstract: We propose a fully functional identity-based encryption (IBE) scheme. The scheme has chosen ciphertext security in the random oracle model assuming a variant of the computational Diffie--Hellman problem. Our system is based on bilinear maps between groups. The Weil pairing on elliptic curves is an example of such a map. We give precise definitions for secure IBE schemes and give several applications for such systems. more

Topics: Weil pairing (69%), ID-based encryption (64%), Pairing-based cryptography (63%) more

5,046 Citations

No. of papers in the topic in previous years

Top Attributes

Show by:

Topic's top 5 most impactful authors

Willy Susilo

184 papers, 5.7K citations

Yi Mu

138 papers, 2.3K citations

Robert H. Deng

111 papers, 4.1K citations

Goichiro Hanaoka

103 papers, 1.2K citations

Brent Waters

86 papers, 19.3K citations

Network Information
Related Topics (5)

37.3K papers, 854.5K citations

96% related

74.7K papers, 867.1K citations

95% related
Public-key cryptography

27.2K papers, 547.7K citations

94% related
Hash function

31.5K papers, 538.5K citations

94% related

11.9K papers, 194.3K citations

94% related