public-key encryption

public-key encryption

(PKE, Or "public-key cryptography") An encryption scheme, introduced by Diffie and Hellman in 1976, where each person gets a pair of keys, called the public key and the private key. Each person's public key is published while the private key is kept secret. Messages are encrypted using the intended recipient's public key and can only be decrypted using his private key. This is often used in conjunction with a digital signature.

The need for sender and receiver to share secret information (keys) via some secure channel is eliminated: all communications involve only public keys, and no private key is ever transmitted or shared.

Public-key encryption can be used for authentication, confidentiality, integrity and non-repudiation.

RSA encryption is an example of a public-key cryptosystem. FAQ.

See also knapsack problem.
References in periodicals archive ?
Functional encryption is a novel paradigm for public-key encryption that enables both fine-grained access control and selective computation on encrypted data, as is necessary to protect big, complex data in the cloud.
RSA is one of the first practicable public-key encryption and is widely used for secure data transmission.
IBM's homomorphic encryption technique solves a daunting mathematical puzzle that confounded scientists since the invention of public-key encryption over 30 years ago.
lt;p>Armed with Certicom's ECC public-key encryption technology and its own SSL business, VeriSign expects to be able to enter new markets, it said.
Assymetric or public-key encryption would be used for key management and digital signature.
The most popular type of public-key encryption, invented by Ronald L.
Let us assume, as its advocates claim, that this system could keep our friends and enemies from using our money card with a technology called public-key encryption.
NTRU has developed public-key encryption technology that operates up to 2,000 times faster than its nearest competitor and in a footprint 1/50th the size, opening the door for new revenue generating products and applications.
Public-key encryption solutions have numerous weaknesses, and suffer from the absence of a universal key repository.
The Internet standard prevents spoofing attacks by allowing Web sites to verify their domain names and corresponding IP addresses using digital signatures and public-key encryption.
These protocols define the use of public-key encryption, data compression, symmetric key encryption, and authentication to implement a security solution.

Full browser ?