Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Public Key Cryptography

Handbook of Research on ICTs and Management Systems for Improving Efficiency in Healthcare and Social Care
Asymmetric cryptography using a pair of keys of which one is made public (the public key) and the other is kept confidential (the private key). It is impossible to derive the private key from the public key. The public key is used to encrypt information, while the corresponding private key is necessary to decrypt the ciphertext. Some schemes allow for signing information (with the private key), and verifying the signature (with the corresponding public key).
Published in Chapter:
Commercial Home Assistance Services
Milica Milutinovic (K.U.Leuven, Belgium), Koen Decroix (Katholieke Hogeschool Sint – Lieven, Belgium), Vincent Naessens (Katholieke Hogeschool Sint – Lieven, Belgium), and Bart De Decker (K.U.Leuven, Belgium)
DOI: 10.4018/978-1-4666-3990-4.ch008
Abstract
In this chapter, the authors describe the software architecture of a commercially run home assistance system that allows patients or elderly people to stay longer at home. Since such systems often have to handle sensitive medical information, the protection of the privacy is a major concern. In addition, legislation often restricts access to health information to qualified persons (i.e. medical personnel), who are not always available in a commercial setting. The home assistance system can offer several services, ranging from scheduling necessary tasks and following up their execution, to monitoring the patient’s health status and responding promptly to requests for help or in case of emergency situations, and all this without the need to maintain personal medical data or identifying information about patients and caregivers in the home assistance centre.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Commercial Home Assistance Services
Asymmetric cryptography using a pair of keys of which one is made public (the public key) and the other is kept confidential (the private key). It is impossible to derive the private key from the public key. The public key is used to encrypt information, while the corresponding private key is necessary to decrypt the ciphertext. Some schemes allow for signing information (with the private key), and verifying the signature (with the corresponding public key).
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Use of Bitcoin for Internet Trade
An encryption technique in which each entity possesses a key pair (public/private key). In comparison with symmetric encryption in which single key is shared among the sender and the receiver, the public key cryptography involves two keys without the need of sharing them.
Full Text Chapter Download: US $37.50 Add to Cart
DNA Cryptography
It is a cryptographic protocol where two distinct keys are used for encryption and decryption process. It is also known as Asymmetric key cryptography. Key distribution centre plays an important role in this technique. Each recipient is provided a pair of keys. The key used for encryption process is private to the sender and the key used for decryption process is public to the others.
Full Text Chapter Download: US $37.50 Add to Cart
Improvements over GGH Using Commutative and Non-Commutative Algebra
An asymmetric cryptography which uses a public key for encryption and a private key for decryption.
Full Text Chapter Download: US $37.50 Add to Cart
A Pervasive Polling Secret-Sharing Based Access Control Protocol for Sensitive Information
A cryptographic paradigm in which every individual owns two bound keys: a public and a private key. What is encrypted with a key can only be decrypted with its counterpart. Public Key Cryptography has helped to evolve security and privacy in the digital era, especially on Internet.
Full Text Chapter Download: US $37.50 Add to Cart
Provable Security for Public Key Cryptosystems: How to Prove that the Cryptosystem is Secure
Public key cryptography or Asymmetric cryptography is a group of algorithms or protocols where two, related and distinct, keys are involved, one is called secret (or private) key and other is called public key. Public-key encryption schemes and signature schemes are examples of public key cryptography.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR