Public Key Encryption with Fuzzy Matching

2021 ◽  
pp. 39-62
Author(s):  
Yuanhao Wang ◽  
Qiong Huang ◽  
Hongbo Li ◽  
Meiyan Xiao ◽  
Jianye Huang ◽  
...  
Informatica ◽  
2012 ◽  
Vol 23 (4) ◽  
pp. 537-562 ◽  
Author(s):  
Ting-Yi Chang ◽  
Min-Shiang Hwang ◽  
Wei-Pang Yang

Author(s):  
Ai ISHIDA ◽  
Keita EMURA ◽  
Goichiro HANAOKA ◽  
Yusuke SAKAI ◽  
Keisuke TANAKA

2009 ◽  
Vol 20 (10) ◽  
pp. 2907-2914 ◽  
Author(s):  
Liao-Jun PANG ◽  
Hui-Xian LI ◽  
Li-Cheng JIAO ◽  
Yu-Min WANG

Author(s):  
Keith M. Martin

In this chapter, we introduce public-key encryption. We first consider the motivation behind the concept of public-key cryptography and introduce the hard problems on which popular public-key encryption schemes are based. We then discuss two of the best-known public-key cryptosystems, RSA and ElGamal. For each of these public-key cryptosystems, we discuss how to set up key pairs and perform basic encryption and decryption. We also identify the basis for security for each of these cryptosystems. We then compare RSA, ElGamal, and elliptic-curve variants of ElGamal from the perspectives of performance and security. Finally, we look at how public-key encryption is used in practice, focusing on the popular use of hybrid encryption.


2019 ◽  
Vol 19 (1) ◽  
pp. 15-38
Author(s):  
Hiroaki Anada ◽  
Akira Kanaoka ◽  
Natsume Matsuzaki ◽  
Yohei Watanabe

Author(s):  
Ziba Eslami ◽  
Mahnaz Noroozi ◽  
Kobra Amirizirtol

2012 ◽  
Vol 71 (2) ◽  
pp. 293-313 ◽  
Author(s):  
Reza Sepahi ◽  
Ron Steinfeld ◽  
Josef Pieprzyk

Sign in / Sign up

Export Citation Format

Share Document