Skip to main content

Questions tagged [public-key]

An asymmetric cipher is an encryption scheme using a pair of keys, one to encrypt and a second to decrypt a message. This way the encrypting key need not be kept secret to ensure a private communication. Similarly in public key authentication, the verification key can be public and the signing key private.

2 votes
1 answer
142 views

The reference is Algorithm 4.2 on page 40 in this document https://sqisign.org/spec/sqisign-20250707.pdf. I'm confused by lines 28-33. We have $I_{com,rsp}$ correspond to the isogeny $\varphi_{rsp}^{...
Myath's user avatar
  • 966
4 votes
1 answer
84 views

The 1999 paper "The Security of all RSA and Discrete Log Bits" by Hastad and Naslund here states that any block of $O(\log \log N)$ bits where $N=pq,$ of the encrypted RSA output is known to ...
kodlu's user avatar
  • 25.7k
0 votes
0 answers
60 views

My problem is specific: basically I want to have a website that is a gallery of my photos and I want the user to be able to view them, but that is the only access the user has. If they attempt to save ...
alan's user avatar
  • 1
4 votes
2 answers
302 views

In their book "Introduction to Modern Cryptography," Katz and Lindell wrote: Digital signatures are often mistakenly viewed as the “inverse” of public-key encryption, with the roles of the ...
parkingfunc's user avatar
2 votes
0 answers
51 views

Are there methods for Public-Key steganography with: Key generation as in public-key encryption Encryption producing (when successful) a Stego Object (analog to ciphertext) from Public Key Payload (...
fgrieu's user avatar
  • 151k
2 votes
2 answers
180 views

What is the exact application or True Randomness in Cryptography, either symmetric or public key? It is well known that the symmetric keys of encryption algorithms are supposed to be chosen randomly ...
Viren Sule's user avatar
3 votes
2 answers
170 views

I have some questions to clarify my understanding about Deuring correspondence between quaternions and isogenies in SQIsign(2D) version 2.0.1 https://sqisign.org/ Let $E_0$ be an elliptic curve with ...
Myath's user avatar
  • 966
3 votes
2 answers
183 views

I want to understand how to relate that $e = 23$ $e$ divides $(p-1)$ I have the value $(p+q)\gg 100$ (where $\gg$ stands for right-shift) I have the value $g = d^{-1}\bmod \varphi$ where $d$ is a ...
STUD's user avatar
  • 63
7 votes
4 answers
2k views

Alice sends Bob an arbitrary message M, signed with her private key. Bob verifies M with her public key A. Later, Alice claims that her public key was actually B all along, and M cannot be her message....
Hackworth's user avatar
  • 173
0 votes
0 answers
50 views

Background I’m implementing Asynchronous Distributed Key Generation (ADKG) over secp256k1 so that N nodes collectively hold a threshold private key. After DKG each node has a secret share. To sign an ...
Shubham Gupta's user avatar
8 votes
2 answers
3k views

In Diffie and Hellmanns famous paper New Directions in Cryptography from 1976, figure 1 on p. 645 (resp. second page in the linked pdf) visualizes the flow of information in symmetric cryptosystems. ...
ATW's user avatar
  • 191
2 votes
1 answer
129 views

After reading some questions about crypting and decrypting on SE, I searched Google for "Meet in the Middle" attacks. I found two links: An implementation on GitHub of an algorithm ...
totalMongot's user avatar
0 votes
0 answers
30 views

This is one step in my new symmetric encryption algorithm. Here: p, c, ek, and ...
S-N's user avatar
  • 169
5 votes
1 answer
231 views

Over the years, new discoveries have weakened some of the mathematical primitives used in cryptography, like the broken Knapsack cryptosystem, Shor's algorithm, etc. What we believe to be hard ...
Jason Smith's user avatar
1 vote
1 answer
114 views

I'd want a public-key encryption scheme with plaintext space the integers modulo some public prime $p$, allowing the computation of a ciphertext that deciphers to $bx+y\bmod p$, given a public integer ...
fgrieu's user avatar
  • 151k

15 30 50 per page
1
2 3 4 5
161