Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions.
Emmanuel A. AdeniyiPeace Busola FalolaMashael S. MaashiMohammed AljebreenSalil BharanyPublished in: Inf. (2022)
Keyphrases
- cryptographic algorithms
- data sharing
- hash functions
- elliptic curve cryptography
- security protocols
- provably secure
- public key cryptography
- encryption scheme
- similarity search
- data integration
- data access
- information sharing
- security mechanisms
- peer to peer
- biometric data
- authentication scheme
- secret key
- security analysis
- sensitive data
- public key infrastructure
- block cipher
- elliptic curve
- key management
- authentication protocol
- access control
- high dimensional
- digital watermark
- digital signature
- feature selection
- data distribution
- key distribution
- data management
- end users
- security issues