Single database private information retrieval with logarithmic communication

YC Chang - Information Security and Privacy: 9th Australasian …, 2004 - Springer
We study the problem of single database private information retrieval, and present a solution
with only logarithmic server-side communication complexity and a solution with only …

[PDF][PDF] Design of Rabin-like cryptosystem without decryption failure

MA Asbullah, MRK Ariffin - Malaysian Journal of Mathematical Sciences, 2016 - core.ac.uk
In this work, we design a new, efficient and practical Rabin-like cryptosystem without using
the Jacobi symbol, redundancy in the message and avoiding the demands of extra …

[HTML][HTML] Security, QoS and energy aware optimization of cloud-edge data centers using game theory and homomorphic encryption: Modeling and formal verification

M Marwan, AA Temghart, S Ouhmi, M Lazaar - Results in Engineering, 2024 - Elsevier
Privacy and efficient data processing are crucial research areas in the field of outsourcing
computing. Thus, the contribution of the paper is twofold. First of all, we develop a secure …

A new rabin-type trapdoor permutation equivalent to factoring

K Schmidt-Samoa - Electronic Notes in Theoretical Computer Science, 2006 - Elsevier
Public key cryptography has been invented to overcome some key management problems
in open networks. Although nearly all aspects of public key cryptography rely on the …

Some RSA-based encryption schemes with tight security reduction

K Kurosawa, T Takagi - Advances in Cryptology-ASIACRYPT 2003: 9th …, 2003 - Springer
In this paper, we study some RSA-based semantically secure encryption schemes (IND-
CPA) in the standard model. We first derive the exactly tight one-wayness of Rabin-Paillier …

Rabin- Cryptosystem: Practical and Efficient Method for Rabin based Encryption Scheme

MA Asbullah, MRK Ariffin - arxiv preprint arxiv:1411.4398, 2014 - arxiv.org
In this work, we introduce a new, efficient and practical scheme based on the Rabin
cryptosystem without using the Jacobi symbol, message redundancy technique or the needs …

HEAD: Hybrid encryption with delegated decryption capability

P Sarkar - International Conference on Cryptology in India, 2004 - Springer
We consider the problem of adding the functionality of delegated decryption on top of usual
encryption schemes. An appropriate security model is described for such schemes. Our …

A new public key cryptosystem over

P Goswami, MM Singh, B Bhuyan - … Mathematics, Algorithms and …, 2017 - World Scientific
At Eurocrypt'99, Paillier showed a cryptographic application of the group ℤ n 2*, the
multiplicative group modulo n 2 where n is some RSA modulus. In this paper, we have …

[KSIĄŻKA][B] Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography

S Vollala, N Ramasubramanian, U Tiwari - 2021 - Springer
Phenomenal demands for all kind of real-time e-commerce transactions and internet usage
insist security as an essential part for protecting sensitive data. Many organizations use …

Study of Some Properties and Behavior of the Group of Signed Quadratic Residues and Its Applications to Cryptography

P Goswami, MM Singh - Novel Developments in Futuristic AI-based …, 2023 - Springer
The application of the group of signed quadratic residues (SQR) is first introduced by
Hofheinz and Kiltz. The group SQR satisfies most of all properties of the group of quadratic …