scispace - formally typeset
Topic

Encryption

About: Encryption is a(n) research topic. Over the lifetime, 98330 publication(s) have been published within this topic receiving 1451391 citation(s). The topic is also known as: encipherment.

...read more

Papers
  More

Open accessJournal ArticleDOI: 10.1145/357980.358017
Abstract: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: (1) Couriers or other secure means are not needed to transmit keys, since a message can be enciphered using an encryption key publicly revealed by the intented recipient. Only he can decipher the message, since only he knows the corresponding decryption key. (2) A message can be “signed” using a privately held decryption key. Anyone can verify this signature using the corresponding publicly revealed encryption key. Signatures cannot be forged, and a signer cannot later deny the validity of his signature. This has obvious applications in “electronic mail” and “electronic funds transfer” systems. A message is encrypted by representing it as a number M, raising M to a publicly specified power e, and then taking the remainder when the result is divided by the publicly specified product, n, of two large secret primer numbers p and q. Decryption is similar; only a different, secret, power d is used, where e * d ≡ 1(mod (p - 1) * (q - 1)). The security of the system rests in part on the difficulty of factoring the published divisor, n.

...read more

Topics: Encryption (66%), Attribute-based encryption (62%), Key (cryptography) (62%) ...read more

14,611 Citations


Patent
30 Sep 2010-
Abstract: PROBLEM TO BE SOLVED: To solve the problem, wherein it is impossible for an electronic content information provider to provide commercially secure and effective method, for a configurable general-purpose electronic commercial transaction/distribution control system. SOLUTION: In this system, having at least one protected processing environment for safely controlling at least one portion of decoding of digital information, a secure content distribution method comprises a process for encapsulating digital information in one or more digital containers; a process for encrypting at least a portion of digital information; a process for associating at least partially secure control information for managing interactions with encrypted digital information and/or digital container; a process for delivering one or more digital containers to a digital information user; and a process for using a protected processing environment, for safely controlling at least a portion of the decoding of the digital information. COPYRIGHT: (C)2006,JPO&NCIPI

...read more

Topics: Information assurance (54%), Information security (51%), Encryption (51%)

7,643 Citations


Open accessBook ChapterDOI: 10.1007/3-540-44647-8_13
Dan Boneh1, Matthew K. Franklin2Institutions (2)
19 Aug 2001-
Abstract: We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffie-Hellman problem. Our system is based on the Weil pairing. We give precise definitions for secure identity based encryption schemes and give several applications for such systems.

...read more

Topics: Weil pairing (70%), Functional encryption (68%), ID-based encryption (68%) ...read more

6,596 Citations


Open accessBook ChapterDOI: 10.1007/3-540-48910-X_16
02 May 1999-
Abstract: This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to public-key cryptography. We propose a new trapdoor mechanism and derive from this technique three encryption schemes : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA. Our cryptosystems, based on usual modular arithmetics, are provably secure under appropriate assumptions in the standard model.

...read more

Topics: Probabilistic encryption (66%), Trapdoor function (65%), Paillier cryptosystem (58%) ...read more

6,049 Citations


Journal ArticleDOI: 10.1137/S0097539701398521
Dan Boneh1, Matthew K. Franklin2Institutions (2)
Abstract: We propose a fully functional identity-based encryption (IBE) scheme. The scheme has chosen ciphertext security in the random oracle model assuming a variant of the computational Diffie--Hellman problem. Our system is based on bilinear maps between groups. The Weil pairing on elliptic curves is an example of such a map. We give precise definitions for secure IBE schemes and give several applications for such systems.

...read more

Topics: Weil pairing (69%), ID-based encryption (64%), Pairing-based cryptography (63%) ...read more

5,046 Citations


Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2022113
20214,779
20206,832
20198,475
20188,154
20177,529

Top Attributes

Show by:

Topic's top 5 most impactful authors

Willy Susilo

184 papers, 5.7K citations

Yi Mu

138 papers, 2.3K citations

Robert H. Deng

111 papers, 4.1K citations

Goichiro Hanaoka

103 papers, 1.2K citations

Brent Waters

86 papers, 19.3K citations

Network Information
Related Topics (5)
Cryptography

37.3K papers, 854.5K citations

96% related
Authentication

74.7K papers, 867.1K citations

95% related
Public-key cryptography

27.2K papers, 547.7K citations

94% related
Hash function

31.5K papers, 538.5K citations

94% related
Ciphertext

11.9K papers, 194.3K citations

94% related