Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key System

2014 ◽  
Vol 8 (3) ◽  
pp. 1157-1177 ◽  
Author(s):  
Keith M. Martin

In this chapter, we introduce public-key encryption. We first consider the motivation behind the concept of public-key cryptography and introduce the hard problems on which popular public-key encryption schemes are based. We then discuss two of the best-known public-key cryptosystems, RSA and ElGamal. For each of these public-key cryptosystems, we discuss how to set up key pairs and perform basic encryption and decryption. We also identify the basis for security for each of these cryptosystems. We then compare RSA, ElGamal, and elliptic-curve variants of ElGamal from the perspectives of performance and security. Finally, we look at how public-key encryption is used in practice, focusing on the popular use of hybrid encryption.


2008 ◽  
Vol 54 (3) ◽  
pp. 401-411 ◽  
Author(s):  
Jong Hwan Park ◽  
Hee Jean Kim ◽  
M.H. Sung ◽  
Dong Hoon Lee

Author(s):  
Donghoon Chang ◽  
Amit Kumar Chauhan ◽  
Naina Gupta ◽  
Arpan Jati ◽  
Somitra Kumar Sanadhya

2020 ◽  
Vol 516 ◽  
pp. 515-528 ◽  
Author(s):  
Baodong Qin ◽  
Yu Chen ◽  
Qiong Huang ◽  
Ximeng Liu ◽  
Dong Zheng

Sign in / Sign up

Export Citation Format

Share Document