Public-Key Encryption Secure Against Related Randomness Attacks for Improved End-to-End Security of Cloud/Edge Computing
Public-key encryption is often used to protect data security/privacy and secure communication in scenarios of cloud computing and edge computing. Related randomness attacks model (RRA) for public-key encryption was motivated by randomness failures. This paper proposes some methods of constructing se...
Main Author: | Pengtao Liu |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8961999/ |
Similar Items
-
Provably sender-deniable encryption scheme
by: N.A. Moldovyan, et al.
Published: (2015-05-01) -
Deniable encryption protocols based on probabilistic public-key encryption
by: Nikolay Moldovyan, et al.
Published: (2017-04-01) -
Bi-deniable public-encryption protocols based on standard PKI
by: Nikolay Moldovyan, et al.
Published: (2016-04-01) -
An Efficient Deniable Authenticated Encryption Scheme for Privacy Protection
by: Wen Huang, et al.
Published: (2019-01-01) -
Stream Deniable-Encryption Algorithms
by: N.A. Moldovyan, et al.
Published: (2016-04-01)