Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Asymmetric Encryption

Advancements in Quantum Blockchain With Real-Time Applications
Also known as public-key cryptography is a method of encrypting and decrypting data.
Published in Chapter:
Introduction to Quantum-Resistant Blockchain
Omega John Unogwu (Universidad Azteca, Mexico), Ruchi Doshi (Universidad Azteca, Mexico), Kamal Kant Hiran (Sir Padampat Singhania University, India), and Maad M. Mijwil (Baghdad College of Economic Sciences University, Iraq)
Copyright: © 2022 |Pages: 20
DOI: 10.4018/978-1-6684-5072-7.ch002
Quantum-resistant blockchains refer to cryptographic processes that are resistant to attacks via quantum computers. Present public-key algorithms depend on the difficulty of deciphering the discrete log and factorization problem of large prime numbers. Shor's algorithm can be used to break the hash signatures by quantum computers. Therefore, it is necessary for the development of a post-quantum secure signature scheme or quantum-resistant blockchain for post-quantum blockchain security. This chapter will discuss the impact quantum computers are predicted to have on public key cryptography based on the following topics: quantum computers, public key cryptography, quantum threat to PKI, Shor's and Grover's algorithms, post-quantum cryptography, and quantum-resistant blockchain.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Security Mechanisms in Cloud Computing-Based Big Data
Public-key cryptography refers to a cryptographic system requiring two separate keys, one of which is secret and one of which is public. Although different, the two parts of the key pair are mathematically linked. One key locks or encrypts the plaintext, and the other unlocks or decrypts the cipher text. Neither key can perform both functions by itself. The public key may be published without compromising security, while the private key must not be revealed to anyone not authorized to read the messages.
Full Text Chapter Download: US $37.50 Add to Cart
Cloud Cryptography
A type of encryption which uses a key pair (public key, private key). If one key is used for encryption then only its pair key is used for decryption.
Full Text Chapter Download: US $37.50 Add to Cart
The Emergence of Cryptography in Blockchain Technology
A cryptographic approach that uses two keys, one for encryption and one for decryption, to provide secure communication and digital signatures.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR