public-key cryptography


Also found in: Dictionary, Wikipedia.
Related to public-key cryptography: Asymmetric cryptography, Asymmetric encryption

public-key cryptography

This article is provided by FOLDOC - Free Online Dictionary of Computing (foldoc.org)
References in periodicals archive ?
Because virtually all internet applications use both symmetric and public-key cryptography, both forms need to be secure.
of the first ACM workshop on Asia public-key cryptography, AsiaPKC'13, Hangzhou, China, pp.
Waters, "Efficient ring signatures without random oracles," in Proceedings of the International Conference on Practice and Theory in Public-Key Cryptography (PKC '07), pp.
Paterson, "Certificateless encryption schemes storngly secure in the standard model," in Proceedings of the International Conference on the Theory and Practice of Public-Key Cryptography (PKC '08), vol.
E-mail encryption involves the use of the public-key cryptography method to encrypt messages and a private key to decrypt the message.
Security mediated certificateless cryptography, Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography, PKC'06, 508-524.
The title of the standard is "IEEE P1363.3: Identity-Based Public-key Cryptography Using Pairings." It specifies schemes for identity-based encryption, identity-based digital signatures, identity-based signcryption, and identity-based key establishment.
He studied computer science at Florida Atlantic University, and he became interested in cryptography in the 1970s, when papers on a technology called public-key cryptography emerged.
According to Tech Crunch, Apple uses public-key cryptography, which is based on a principle that each message has two keys, one for input and other for pickup, and unless someone finds a copy of the pickup key, or find a weakness in the system, there is no way intercept.
Public-key cryptography based on ECC currently offer both higher security and better performance compared to RSA.

Full browser ?