Skip to main content

Questions tagged [public-key]

An asymmetric cipher is an encryption scheme using a pair of keys, one to encrypt and a second to decrypt a message. This way the encrypting key need not be kept secret to ensure a private communication. Similarly in public key authentication, the verification key can be public and the signing key private.

3 votes
1 answer
289 views

We know that key exchange is a less "advanced" cryptographic primitive than public key encryption. In the first paper of public key cryptography, Diffie and Hellman has mentioned that they ...
user1035648's user avatar
2 votes
1 answer
90 views

I would like to know whether GPV-IBE is isometric. I would like to use type-2 operators for a proof, and I can only apply these if GPV-IBE is isometric. Here is the definition of non-isometric as ...
Kleini's user avatar
  • 41
1 vote
1 answer
87 views

I am a layman in this field, so forgive me if this is not correct. The framework I thought of involves every website having two public keys and two private keys. Call public keys p and q, and the ...
Ryder Rude's user avatar
11 votes
1 answer
1k views

According to Bernstein[1], it is possible to compress RSA/Rabin public keys by a factor of 2 and 3. And compress signatures by a factor of 2. Apparently, by using Coppersmith's lattice methods. I wasn'...
Arima's user avatar
  • 113
0 votes
0 answers
63 views

Consider the following construction based on an exact quadratic gap between two primes. Let 𝑝 be a public prime. A valid private structure consists of: • a prime 𝑞 such that 𝑞 > 𝑝; • a ...
junior ns's user avatar
5 votes
2 answers
716 views

Using a sealed_box type construct (eg. tool like age[1]) with non-hybrid ECC. Payload is encrypted to some recipient ECC public key. In this scenario, the recipient public key remains secret. Having ...
Caliph's user avatar
  • 53
0 votes
0 answers
52 views

Construct a public-key encryption scheme which is CPA secure but not circularly secure, relying only on the existence of public-key encryption schemes. This is a problem from my cryptography course ...
minukesis's user avatar
2 votes
1 answer
177 views

The reference is Algorithm 4.2 on page 40 in this document https://sqisign.org/spec/sqisign-20250707.pdf. I'm confused by lines 28-33. We have $I_{com,rsp}$ correspond to the isogeny $\varphi_{rsp}^{...
Myath's user avatar
  • 976
4 votes
1 answer
160 views

The 1999 paper "The Security of all RSA and Discrete Log Bits" by Hastad and Naslund here states that any block of $O(\log \log N)$ bits where $N=pq,$ of the encrypted RSA output is known to ...
kodlu's user avatar
  • 25.9k
4 votes
2 answers
333 views

In their book "Introduction to Modern Cryptography," Katz and Lindell wrote: Digital signatures are often mistakenly viewed as the “inverse” of public-key encryption, with the roles of the ...
parkingfunc's user avatar
2 votes
1 answer
108 views

Are there methods for Public-Key steganography with: Key generation as in public-key encryption Encryption producing (when successful) a Stego Object (analog to ciphertext) from Public Key Payload (...
fgrieu's user avatar
  • 151k
2 votes
2 answers
219 views

What is the exact application or True Randomness in Cryptography, either symmetric or public key? It is well known that the symmetric keys of encryption algorithms are supposed to be chosen randomly ...
Viren Sule's user avatar
3 votes
2 answers
203 views

I have some questions to clarify my understanding about Deuring correspondence between quaternions and isogenies in SQIsign(2D) version 2.0.1 https://sqisign.org/ Let $E_0$ be an elliptic curve with ...
Myath's user avatar
  • 976
3 votes
2 answers
205 views

I want to understand how to relate that $e = 23$ $e$ divides $(p-1)$ I have the value $(p+q)\gg 100$ (where $\gg$ stands for right-shift) I have the value $g = d^{-1}\bmod \varphi$ where $d$ is a ...
STUD's user avatar
  • 63
7 votes
4 answers
2k views

Alice sends Bob an arbitrary message M, signed with her private key. Bob verifies M with her public key A. Later, Alice claims that her public key was actually B all along, and M cannot be her message....
Hackworth's user avatar
  • 173

15 30 50 per page
1
2 3 4 5
161