Revocable certificateless public key encryption with equality test

TT Tsai, HY Lin, HC Tsai - Information Technology and Control, 2022 - itc.ktu.lt
Traditional public key cryptography requires certificates as a link between each user's
identity and her/his public key. Typically, public key infrastructures (PKI) are used to manage …

An Analysis of Public-Key Cryptography (PKC) Architecture for Hardware Security

M Priyatharshini, C Sharanya - 2023 Second International …, 2023 - ieeexplore.ieee.org
Hardware security recreates an important part of protecting devices and data from stealing.
Hardware-based security solutions deliver better security than software security, which is …

Compute digital signature authentication sign instruction

EM Schwarz, JD Bradbury, ET Malley… - US Patent …, 2022 - Google Patents
(57) ABSTRACT A single architected instruction to produce a signature for a message is
obtained. The instruction is executed, and the executing includes determining a sign …

[PDF][PDF] A public key data encryption based on elliptic curves

N Mehibel, M Hamadouche - International Journal of Mathematical and …, 2017 - iaras.org
The basic Elliptic Curve Cryptosystem used for encryption is Elgamal encryption scheme, it
is a public key cryptosystem which is based on the difficulty of the Elliptic Curve Discrete …

Secret sharing based SM2 digital signature generation using homomorphic encryption

Y Long, M Cheng - 2019 15th International Conference on …, 2019 - ieeexplore.ieee.org
SM2 is an elliptic curve public key cryptography algorithm released by the State
Cryptography Administration of China. It includes digital signature, data encryption and key …

Introduction to Public-Key Cryptosystems and Hotspot Analysis Based on CiteSpace

Z Zhang - 2022 International Conference on Information …, 2022 - ieeexplore.ieee.org
This paper first introduces the relationship between classical cryptography and public-key
cryptography, presents the public-key cryptosystem, draws out the research status and …

Compute digital signature authentication verify instruction

EM Schwarz, JD Bradbury, ET Malley… - US Patent …, 2021 - Google Patents
A single architected instruction to verify a signed message is executed. The executing
includes determining a verify function of a plurality of verify functions supported by the …

Compute digital signature authentication sign with encrypted key instruction

EM Schwarz, JD Bradbury, ET Malley… - US Patent …, 2021 - Google Patents
A single architected instruction to produce a signature for a message is executed. The
executing includes determining an encrypted sign function of a plurality of encrypted sign …

[CITAZIONE][C] Application Of ECC And ECDSA For Image With Error Control Technique Using RS Code

GS Sastry, S Sasi