Certificateless Public Key Cryptography

  • Conference paper
  • Cite this conference paper

public key research paper

  • Sattam S. Al-Riyami 5 &
  • Kenneth G. Paterson 5  

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2894))

Included in the following conference series:

  • International Conference on the Theory and Application of Cryptology and Information Security

9888 Accesses

936 Citations

8 Altmetric

This paper introduces and makes concrete the concept of certificateless public key cryptography (CL-PKC), a model for the use of public key cryptography which avoids the inherent escrow of identity-based cryptography and yet which does not require certificates to guarantee the authenticity of public keys. The lack of certificates and the presence of an adversary who has access to a master key necessitates the careful development of a new security model. We focus on certificateless public key encryption (CL-PKE), showing that a concrete pairing-based CL-PKE scheme is secure provided that an underlying problem closely related to the Bilinear Diffie-Hellman Problem is hard.

Download to read the full chapter text

Chapter PDF

Similar content being viewed by others.

public key research paper

Certificateless Public Key Signature Schemes from Standard Algorithms

public key research paper

Certificateless Key-Insulated Encryption: Cryptographic Primitive for Achieving Key-Escrow Free and Key-Exposure Resilience

public key research paper

An Efficient Certificate-Based Encryption Scheme Without Random Oracles

  • Signature Scheme
  • Random Oracle
  • Challenge Ciphertext
  • Decryption Query

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Adams, C., Lloyd, S.: Understanding Public-Key Infrastructure – Concepts, Standards, and Deployment Considerations. Macmillan, Indianapolis (1999)

Google Scholar  

Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. Cryptology ePrint Archive, Report 2003/126 (2003), http://eprint.iacr.org/

Barreto, P.S.L.M., et al.: Efficient algorithms for pairing-based cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 354–368. Springer, Heidelberg (2002)

Chapter   Google Scholar  

Bellare, M., et al.: Relations among notions of security for public-key encryption schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, p. 26. Springer, Heidelberg (1998)

Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM J. Computing 32(3), 586–615 (2003)

Article   MATH   MathSciNet   Google Scholar  

Boneh, D., Shacham, H., Lynn, B.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)

Chen, L., et al.: Certification of public keys within an identity based system. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol. 2433, pp. 322–333. Springer, Heidelberg (2002)

Dankers, J., et al.: Public key infrastructure in mobile systems. IEE Electronics and Commucation Engineering Journal 14(5), 180–190 (2002)

Article   Google Scholar  

Dolev, D., Dwork, C., Naor, M.: Non-malleable cryptography. SIAM Journal of Computing 30(2), 391–437 (2000)

Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537–554. Springer, Heidelberg (1999)

Galbraith, S.D., Harrison, K., Soldera, D.: Implementing the Tate pairing. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol. 2369, pp. 324–337. Springer, Heidelberg (2002)

Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 272–293. Springer, Heidelberg (2003)

Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548–566. Springer, Heidelberg (2002)

Girault, M.: Self-certified public keys. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 490–497. Springer, Heidelberg (1991)

Gutmann, P.: PKI: It’s not dead, just resting. IEEE Computer 35(8), 41–49 (2002)

Hess, F.: Efficient identity based signature schemes based on pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 310–324. Springer, Heidelberg (2003)

Paterson, K.G.: Cryptography from pairings: a snapshot of current research. Information Security Technical Report 7(3), 41–54 (2002)

Petersen, H., Horster, P.: Self-certified keys – concepts and applications. In: 3rd Int. Conference on Communications and Multimedia Security. Chapman and Hall, Boca Raton (1997)

Rackoff, C., Simon, D.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433–444. Springer, Heidelberg (1992)

Saeednia, S.: Identity-based and self-certified key-exchange protocols. In: Varadharajan, V., Pieprzyk, J., Mu, Y. (eds.) ACISP 1997. LNCS, vol. 1270, pp. 303–313. Springer, Heidelberg (1997)

Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

Smart, N.P.: An identity based authenticated key agreement protocol based on the Weil pairing. Electronics Letters 38(13), 630–632 (2002)

Article   MATH   Google Scholar  

Smart, N.P.: Access control using pairing based cryptography. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 111–121. Springer, Heidelberg (2003)

Download references

Author information

Authors and affiliations.

Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX

Sattam S. Al-Riyami & Kenneth G. Paterson

You can also search for this author in PubMed   Google Scholar

Editor information

Editors and affiliations.

Department of Electrical Engineering, National Cheng Kung University,  

Chi-Sung Laih

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper.

Al-Riyami, S.S., Paterson, K.G. (2003). Certificateless Public Key Cryptography. In: Laih, CS. (eds) Advances in Cryptology - ASIACRYPT 2003. ASIACRYPT 2003. Lecture Notes in Computer Science, vol 2894. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-40061-5_29

Download citation

DOI : https://doi.org/10.1007/978-3-540-40061-5_29

Publisher Name : Springer, Berlin, Heidelberg

Print ISBN : 978-3-540-20592-0

Online ISBN : 978-3-540-40061-5

eBook Packages : Springer Book Archive

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

What a lovely hat

Is it made out of tin foil , paper 2023/715, sok: research motivations of public-key cryptography.

The design, proposal, and analysis of cryptographic primitives and protocols (schemes) are one of the primary research fields in cryptology. To advance this research field, it is crucial to fully understand their research motivations. In this paper, we systematically introduce the research motivations for designing and proposing new schemes in public-key cryptography. We found that all research motivations aim to produce benefits for humanity including efficiency, security, and functionality, although some of them may be not obvious or only hold conditionally. We categorize benefits in research motivations into 3 ways, 6 types, and 17 areas. As examples, we introduce 40 research strategies within these areas for exploring benefits, each presented as ``From less-adj (in the first scheme) To more-adj (in the second scheme)", where ``adj" here refers to an adjective word representing a positive outcome. This SOK paper aims to provide valuable insights into the driving forces behind advancements in public-key cryptography, facilitating future research efforts in this field.

IACR Logo

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

  • DOI: 10.1007/978-3-540-69839-5_96
  • Corpus ID: 9648220

Public Key Encryption with Keyword Search Revisited

  • J. Baek , R. Safavi-Naini , W. Susilo
  • Published in Communication Systems and… 30 June 2008
  • Computer Science

534 Citations

A study of public key encryption with keyword search, a secure channel free public key encryption with keyword search scheme without random oracle.

  • Highly Influenced

Efficient Public Key Encryption with Keyword Search Schemes from Pairings

A new public key encryption with temporary keyword search, a new trapdoor-indistinguishable public key encryption with keyword search, new efficient searchable encryption schemes from bilinear pairings, an efficient secure channel free searchable encryption scheme with multiple keywords, efficient public key encryption with revocable keyword search, on the security of a certificateless public key encryption with keyword search, an efficient public key encryption with conjunctive-subset keywords search, 15 references, searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions, public-key encryption in a multi-user setting: security proofs and improvements, key-privacy in public-key encryption, multi-recipient public-key encryption with shortened ciphertext, public key encryption with keyword search.

  • Highly Influential
  • 10 Excerpts

Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles

Identity-based encryption from the weil pairing, random oracles are practical: a paradigm for designing efficient protocols, secure conjunctive keyword search over encrypted data, an identity based encryption scheme based on quadratic residues, related papers.

Showing 1 through 3 of 0 Related Papers

  • For Individuals
  • For Businesses
  • For Universities
  • For Governments
  • Online Degrees
  • Find your New Career
  • Join for Free

What Is a Public Key?

Learn what a public key is, how it relates to public key encryption, and when you might need to use one.

[Featued image] A cybersecurity analyst is working from home and is learning about public keys.

A public key is a type of cryptographic code that’s used to encrypt and decrypt sensitive information. “Keys” in cryptography are pieces of information that scramble data so it’ is uninterpretable without an algorithm specifically designed to unlock the information. A public key, along with its counterpart, a private key, forms the cornerstone of public key cryptography. 

Read more: Cybersecurity Terms: A to Z Glossary

Why are public keys important?

Public keys are important because they help protect sensitive information and send it securely. 

For example, imagine sending a confidential letter that’s only intended for the recipient, you might consider sending the letter in a locked box, but you would also have to send the key. However, if someone intercepts your package they’ll have access to the key and easily unlock the box and read your letter. This is the challenge that public key encryption aims to solve.

With public key encryption, instead of one key, you have two. So when sending your letter in a locked box, your public key would protect (or encrypt) the box, and only the private key of the recipient can unlock (or decrypt) it. This way, even if someone intercepts your package, they can't open the box without the recipient's private key. The public key ensures your message remains secure during its journey.

What is public key encryption?

Public key encryption, also known as asymmetrical encryption and public key cryptography, is a type of encryption that secures data transfer over the internet. The term “ public” means it's openly distributed and accessible to everyone, while the “private” key is known only to the owner . 

How are public keys used?

Public keys are commonly used in secure digital information transfers, such as with cryptocurrencies and digital signatures. For a cryptocurrency wallet, the public key acts as an address that people can send you cryptocurrency with. It's simliar to an email address, but for cryptocurrency. On the other hand, your private key allows you to access and manage your crypto. With it, you can prove the cryptocurrency belongs to you.

Public keys are also used in the creation of digital signatures. Just as you sign a paper document to verify it came from you, a digital signature does the same for electronic documents. Here, the private key creates the signature, and the public key validates it. It guarantees that no one tampered with the message during transit and authenticates the sender's identity.

Related terms

Encapsulation

Private key

Authentication

Start learning on Coursera

If you’re ready to get started in a cybersecurity career, consider enrolling in the Google Cybersecurity Professional Certificate on Coursera. Learn how to use job essential tools like Splunk, Chronicle, playbook, and more. This program is designed ​​to help individuals with no previous experience find their first job in the cybersecurity field, all at their own pace. 

Keep reading

Coursera staff.

Editorial Team

Coursera’s editorial team is comprised of highly experienced professional editors, writers, and fact...

This content has been made available for informational purposes only. Learners are advised to conduct additional research to ensure that courses and other credentials pursued meet their personal, professional, and financial goals.

  • svg]:fill-accent-900">

The paper most likely to give you a paper cut, according to science

By Andrew Paul

Posted on Aug 27, 2024 11:58 AM EDT

3 minute read

After a thorough investigation into the matter, three researchers at the Technical University of Denmark believe they have determined which paper varieties are the most likely to induce a dreaded paper cut . But instead of simply warning the public, the trio of physicists embraced the dark knowledge to create a single-use weapon capable of slicing into vegetables, fruit, and even some meat.

It doesn’t take a major logical leap to assume that for as long as there has been paper, there have also been paper cuts . Aside from the searing pain, one of the millennia-old injury’s biggest annoyances is its suddenness—in most cases, a victim isn’t anticipating a razor-thin incision’s sting when rifling through the everyday material. But what paper types should you be the most wary of handling? According to a study published in the August issue of the journal Physical Review E , it comes down to a combination of material, thinness, and physics.

Diagram of papers most likely to cut skin

According to an August 27 announcement , Sif Fink Arnbjerg-Nielsen, Matthew Biviano and Kaare Jensen relied on ballistic gelatin as a stand-in for living subject—the recognizable, rubbery material often used to simulate human and animal skin while assessing possible damage from dangerous environments and weapons. After reviewing multiple types of pulped wood and approaches, the team definitively landed on a few key attributes that can be found in the perfect paper cut.

First, there is a clear “Goldilocks zone” when it comes to a paper’s width. If the material is too thin, like tissue paper, then it bends under pressure. Thicker notecards and photo paper, however, means the surface area simply won’t cut through much. But the closer a paper is to 65 micrometers wide, the more primed it is for a cut. That fearsome measurement is most often seen in examples like sheets of newspaper or dot-matrix printer paper (think the old school typewriter or fax machine paper). Thankfully for fingers, both varieties aren’t as common as they once were—the former sadly due to the unfortunate state of print media, while the latter has been largely swapped out for inkjet paper.

[Related: Why do paper cuts hurt so much? ]

That doesn’t mean society is safe from paper cuts, of course. As anyone who works in an office knows, those inkjet reems are still perfectly capable of ruining your morning. Meanwhile, both magazines and Post-It notes are also still thin enough to do damage.

Material isn’t the only factor for cutting potential, however. The physicists also learned that, much like a knife or sword, an angled motion is most likely to result in cuts instead of a straight-on approach to a target. And to put all this new knowledge to use, researchers then decided to showcase just how effective the perfect paper can be at slicing.After combining a 3D-printed scalpel handle with a small piece of dot-matrix printer paper, the group then put their tool, dubbed “Papermachete,” to use. According to Science News , the single-use Papermachete blade could adequately cut into cucumbers, apples, peppers, and even chicken. There’s (likely) no need to fear such an invention, however—the team argues future iterations may actually provide a new type of eco-friendly, disposable, cheap utensil.

Latest in Physics

The world’s fastest microscope captures electrons down to the attosecond the world’s fastest microscope captures electrons down to the attosecond, how the large hadron collider gets reset and refreshed each year how the large hadron collider gets reset and refreshed each year.

By Riccardo Maria Bianchi / The Conversation

Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

encyclopedia-logo

Article Menu

public key research paper

  • Subscribe SciFeed
  • Google Scholar
  • on Google Scholar
  • Table of Contents

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

JSmol Viewer

The “pink tax” and gender price disparity in personal care.

public key research paper

1. Introduction

2. literature review, 2.1. pink tax types, 2.2. economic aspects, 2.3. social media influence, 2.4. store design and layout, 3. discussion, 4. conclusions, author contributions, institutional review board statement, informed consent statement, data availability statement, conflicts of interest.

  • Guittar, S.G.; Grauerholz, L.; Kidder, E.N.; Daye, S.D.; McLaughlin, M. Beyond the pink tax: Gender-based pricing and differentiation of personal care products. Gend. Issues 2022 , 39 , 1–23. [ Google Scholar ] [ CrossRef ]
  • Dominguez Gonzalez, K.; Machado, A.L.; Bianchi Alves, B.; Raffo, V.; Guerrero, S.; Portabales, I. Why Does She Move? A Study of Women’s Mobility in Latin American Cities ; World Bank: Washington, DC, USA, 2020. [ Google Scholar ]
  • Moshary, S.; Tuchman, A.; Vajravelu, N. Gender-Based Pricing in Consumer Packaged Goods: A Pink Tax? Mark. Sci. 2023 . [ Google Scholar ] [ CrossRef ]
  • Bhargava, R.; Tara, R. Pink Tax: The Gender Bias in Product Recommendations and Corporate Social Responsibility. LSE Hum. Rights. 2022 , 1 , 2023. [ Google Scholar ]
  • Kpoku, O.K. Positive and Negative Influence of Globalization on International Business Actors’ Activity (on Materials of Unilever Group). Ph.D. Thesis, Lincoln School of Business, Lincoln, UK, 2021. [ Google Scholar ]
  • Lafferty, M. The pink tax: The persistence of gender price disparity. Midwest J. Undergrad. Res. 2019 , 11 , 56–72. [ Google Scholar ]
  • Ferrell, O.; Kapelianis, D.; Ferrell, L.; Rowland, L. Expectations and attitudes toward gender-based price discrimination. J. Bus. Ethics 2018 , 152 , 1015–1032. [ Google Scholar ] [ CrossRef ]
  • Liston-Heyes, C.; Neokleous, E. Gender-based pricing in the hairdressing industry. J. Consum. Policy 2000 , 23 , 107–126. [ Google Scholar ] [ CrossRef ]
  • Manzano-Antón, R.; Martinez-Navarro, G.; Gavilan-Bouzas, D. Gender identity, consumption and price discrimination. Rev. Lat. Comun. Soc. 2018 , 73 , 385–400. [ Google Scholar ] [ CrossRef ]
  • Drake, C.; Radford, S.K. Gender Performance Through Products: Four Practices Responding to Masculine and Feminine Codes in Product Design. In Consumer Culture Theory ; Emerald Publishing Limited: Bingley, UK, 2018; pp. 123–144. [ Google Scholar ]
  • Mears, A. Pricing Beauty: The Making of a Fashion Model ; University of California Press: Oakland, CA, USA, 2011. [ Google Scholar ]
  • Maclaran, P.; Chatzidakis, A. Gendered Marketing ; Edward Elgar Publishing: Northampton, MA, USA, 2022. [ Google Scholar ]
  • Smith, M.; Puczkó, L. Health and Wellness Tourism ; Routledge: Oxfordshire, UK, 2008. [ Google Scholar ]
  • Mayasari, I.; Wiadi, I. Purchasing massive prestige brands: The exploration of consumers’ value perceptions. ASEAN Mark. J. 2017 , 9 , 1. [ Google Scholar ]
  • Chakraborti, J.; Dasgupta, M.; Jana, B. Fingertips: How women entrepreneurs are reshaping the beauty and wellness business in India. Emerald Emerg. Mark. Case Stud. 2022 , 12 , 1–29. [ Google Scholar ] [ CrossRef ]
  • Seelkopf, L. Taxation and gender. In Handbook on the Politics of Taxation ; Edward Elgar Publishing: Northampton, MA, USA, 2021; pp. 192–207. [ Google Scholar ]
  • Crawford, B.J.; Waldman, E.G. The unconstitutional tampon tax. Univ. Richmond Law Rev. 2018 , 53 , 439. [ Google Scholar ]
  • Ooi, J. Bleeding women dry: Tampon taxes and menstrual inequity. Northwestern Univ. Law Rev. 2018 , 113 , 109. [ Google Scholar ]
  • Yazıcıoğlu, A.E. Pink Tax and the Law: Discriminating against Women Consumers ; Routledge: Oxfordshire, UK, 2018. [ Google Scholar ]
  • Rostvik, C.M. Tampon Technology in Britain: Unilever’s Project Hyacinth and 7-Day War Campaign, 1968–1980. Technol. Cult. 2022 , 63 , 61–86. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Bodnar, K.; Cohen, J.L. The B2B Social Media Book: Become a Marketing Superstar by Generating Leads with Blogging, LinkedIn, Twitter, Facebook, Email, and More ; John Wiley & Sons: Hoboken, NJ, USA, 2011. [ Google Scholar ]
  • Reame, N.K. Toxic shock syndrome and tampons: The birth of a movement and a research ‘Vagenda’. In The Palgrave Handbook of Critical Menstruation Studies ; Palgrave Macmillan: Singapore, 2020; pp. 687–703. [ Google Scholar ]
  • Brodesser-Akner, T. How Goop’s Haters Made Gwyneth Paltrow’s Company Worth $ 250 Million. International New York Times , 25 July 2018. [ Google Scholar ]
  • Prothero, A.; Tadajewski, M. #MeToo and Beyond: Inequality and Injustice in Marketing Practice and Academia ; Taylor & Francis: Abingdon, UK, 2021; Volume 37, pp. 1–20. [ Google Scholar ]
  • Storz, M.A.; Beckschulte, K.; Brommer, M.; Lombardo, M. Current sex distribution of cooking and food shopping responsibilities in the United States: A cross-sectional study. Foods 2022 , 11 , 2840. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Harvey, A.M. Gender pay gap elimination: A hopeless dream or a conceivable reality? Labor Law J. 2023 , 74 , 157. [ Google Scholar ]
  • Crawford, B.J. Pink tax and other tropes. Yale J. Law Fem. 2023 , 34 , 88. [ Google Scholar ] [ CrossRef ]
  • Bhatia, N.; Moshary, S.; Tuchman, A. Investigating the Pink Tax: Evidence against a Systematic Price Premium for Women in Cpg. p. 3882214. Available online: https://www.ftc.gov/system/files/documents/public_events/1588356/mosharybhatiatuchman_updated2.pdf (accessed on 20 August 2024).
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

Wishart, G.; Poo, M.C.-P.; Baxter, K.; Lau, Y.-y. The “Pink Tax” and Gender Price Disparity in Personal Care. Encyclopedia 2024 , 4 , 1279-1285. https://doi.org/10.3390/encyclopedia4030083

Wishart G, Poo MC-P, Baxter K, Lau Y-y. The “Pink Tax” and Gender Price Disparity in Personal Care. Encyclopedia . 2024; 4(3):1279-1285. https://doi.org/10.3390/encyclopedia4030083

Wishart, Grace, Mark Ching-Pong Poo, Katherine Baxter, and Yui-yip Lau. 2024. "The “Pink Tax” and Gender Price Disparity in Personal Care" Encyclopedia 4, no. 3: 1279-1285. https://doi.org/10.3390/encyclopedia4030083

Article Metrics

Further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

  • Download PDF
  • Share X Facebook Email LinkedIn
  • Permissions

Conducting Research in the New Abortion Care Policy Landscape

  • 1 University of Michigan Ford School of Public Policy, Ann Arbor
  • Research Letter A Cautionary Note on Trends in Maternal Death Post- Dobbs v Jackson Women’s Health Amanda Jean Stevenson, PhD; Leslie Root, PhD JAMA Network Open

The public policy chaos fueled by the June 2022 Dobbs v Jackson Women’s Health Organization Supreme Court decision has created a critical need for objective and high-quality abortion policy evaluation research. Stevenson and Root 1 rose to this challenge by conducting a convincing analysis of recent trends in maternal mortality, motivated in part by pro-life advocate claims that the recent observed decline in pregnancy-related death is the counterintuitive result of more restrictive abortion policies post– Dobbs v Jackson Women’s Health . Using 5.75 years of monthly national maternal mortality data from January 2018 through September 2023, their decomposition approach considered spikes in mortality from COVID-19 and potential seasonal fluctuations in maternal deaths. The findings clearly demonstrate that the observed decline in maternal mortality after the 2022 Dobbs v Jackson Women’s Health ruling is the result of a resolution of the COVID-19 mortality shock, not because of new restrictive abortion laws being passed by state legislatures.

This work is among the first published analyses of the potential effects of restrictive state abortion policies in the post– Dobbs v Jackson Women’s Health aftermath. Additional research on a wide array of potential outcomes needs to be conducted to fully understand the range and magnitude of the outcomes of state-level abortion policies. Based on a plethora of prior research regarding unintended pregnancy and abortion, reduced access to abortion care is thought to decrease the incidence of abortion but also increase the risk and incidence of myriad adverse maternal and infant health outcomes. 2 Restrictive abortion policies are also expected to increase child poverty, increase the number of families that experience serious financial instability or hardship, and put additional pressures on underresourced social welfare systems. 2 In addition, there is great concern that restrictive abortion laws will negatively impact physician choice regarding where to train or practice and the availability of obstetric care across states. 3

After major public policy reforms, it is common for stakeholders—proponents and opponents alike—to look for positive and negative policy effects immediately. While easy to conduct, armchair policy impact pontification is fraught with error and false conclusions. Identifying the impact of public policy change is not a simple task. Besides the obvious cautionary chant that correlation is not causation, evaluating the degree to which public policy shifts are having both intended and unintended consequences requires sound approaches to methods, timely access to quality data, and sophisticated statistical analyses that control for underlying trends and confounding factors. 4

Furthermore, there is often discussion and debate among researchers themselves regarding how to investigate the effects of important public health, medical, and health care interventions and policies. The convening of expert panels or working groups to provide guidance regarding research priorities and best approaches to research design, data or measurement, and analyses on specific topics is long-standing. It can provide essential scientific direction to emerging issues, including ones fraught with political controversy. For example, the National Academy of Medicine has convened many methods-focused committees in challenging areas of research, including reports such as Priorities for Research to Reduce the Threat of Firearm-Related Violence (2013) and A Framework for Assessing Mortality and Morbidity After Large-Scale Disasters (2020).

There is a crucial need for investment in scientific discourse regarding how best to investigate the wide range of potential medical, public health, and social welfare effects of public policy related to abortion care. 5 An organization with authority and resources, such as the Department of Health and Human Services, the National Academy of Science, Engineering, and Medicine, or a foundation with a health-related mission, should quickly convene an ad hoc panel of experts to produce a nonpartisan, nonideological consensus document that provides guidance for objective public policy evaluation research associated with state-level restrictive abortion care policies. Such a panel could help create a priority research agenda for funders and provide guidance regarding data or measurement, research designs, statistical analyses approaches, and other methodology issues. This includes guidance for taking advantage of state differences in policy design, timing, and state contextual factors (eg, state Medicaid policy) and for subpopulation analyses since restrictive abortion laws are likely to have differential effects based on race or ethnicity, age, socioeconomic status, and geography.

In summary, the analysis by Stevenson and Root 1 provides a convincing assessment of an issue regarding abortion policy: the recent decline in maternal mortality after the Dobbs v Jackson Women’s Health ruling may be the result of a decrease in COVID-19–related maternal death rather than state legislatures’ new power to ban or severely restrict abortion care. However, there are many other important research questions regarding the health and social effects of the new abortion policy regime in the US. Investments in public policy evaluation research must be made quickly, including guidance for a priority research agenda and associated objective research designs, methods, and analysis approaches. Otherwise, the erroneous musings of amateur analysts of all ideological perspectives are likely to obscure a deep understanding of the actual effects of restrictive abortion policies on individuals and on population health outcomes, including medical care access, maternal and infant health, and the social welfare of families and children.

Published: August 27, 2024. doi:10.1001/jamanetworkopen.2024.30000

Open Access: This is an open access article distributed under the terms of the CC-BY License . © 2024 Lantz PM. JAMA Network Open .

Corresponding Author: Paula M. Lantz, PhD, MS, University of Michigan Ford School of Public Policy, 735 S State St, Ann Arbor, MI 48109-3091 ( [email protected] ).

Conflict of Interest Disclosures: None reported.

See More About

Lantz PM. Conducting Research in the New Abortion Care Policy Landscape. JAMA Netw Open. 2024;7(8):e2430000. doi:10.1001/jamanetworkopen.2024.30000

Manage citations:

© 2024

Select Your Interests

Customize your JAMA Network experience by selecting one or more topics from the list below.

  • Academic Medicine
  • Acid Base, Electrolytes, Fluids
  • Allergy and Clinical Immunology
  • American Indian or Alaska Natives
  • Anesthesiology
  • Anticoagulation
  • Art and Images in Psychiatry
  • Artificial Intelligence
  • Assisted Reproduction
  • Bleeding and Transfusion
  • Caring for the Critically Ill Patient
  • Challenges in Clinical Electrocardiography
  • Climate and Health
  • Climate Change
  • Clinical Challenge
  • Clinical Decision Support
  • Clinical Implications of Basic Neuroscience
  • Clinical Pharmacy and Pharmacology
  • Complementary and Alternative Medicine
  • Consensus Statements
  • Coronavirus (COVID-19)
  • Critical Care Medicine
  • Cultural Competency
  • Dental Medicine
  • Dermatology
  • Diabetes and Endocrinology
  • Diagnostic Test Interpretation
  • Drug Development
  • Electronic Health Records
  • Emergency Medicine
  • End of Life, Hospice, Palliative Care
  • Environmental Health
  • Equity, Diversity, and Inclusion
  • Facial Plastic Surgery
  • Gastroenterology and Hepatology
  • Genetics and Genomics
  • Genomics and Precision Health
  • Global Health
  • Guide to Statistics and Methods
  • Hair Disorders
  • Health Care Delivery Models
  • Health Care Economics, Insurance, Payment
  • Health Care Quality
  • Health Care Reform
  • Health Care Safety
  • Health Care Workforce
  • Health Disparities
  • Health Inequities
  • Health Policy
  • Health Systems Science
  • History of Medicine
  • Hypertension
  • Images in Neurology
  • Implementation Science
  • Infectious Diseases
  • Innovations in Health Care Delivery
  • JAMA Infographic
  • Law and Medicine
  • Leading Change
  • Less is More
  • LGBTQIA Medicine
  • Lifestyle Behaviors
  • Medical Coding
  • Medical Devices and Equipment
  • Medical Education
  • Medical Education and Training
  • Medical Journals and Publishing
  • Mobile Health and Telemedicine
  • Narrative Medicine
  • Neuroscience and Psychiatry
  • Notable Notes
  • Nutrition, Obesity, Exercise
  • Obstetrics and Gynecology
  • Occupational Health
  • Ophthalmology
  • Orthopedics
  • Otolaryngology
  • Pain Medicine
  • Palliative Care
  • Pathology and Laboratory Medicine
  • Patient Care
  • Patient Information
  • Performance Improvement
  • Performance Measures
  • Perioperative Care and Consultation
  • Pharmacoeconomics
  • Pharmacoepidemiology
  • Pharmacogenetics
  • Pharmacy and Clinical Pharmacology
  • Physical Medicine and Rehabilitation
  • Physical Therapy
  • Physician Leadership
  • Population Health
  • Primary Care
  • Professional Well-being
  • Professionalism
  • Psychiatry and Behavioral Health
  • Public Health
  • Pulmonary Medicine
  • Regulatory Agencies
  • Reproductive Health
  • Research, Methods, Statistics
  • Resuscitation
  • Rheumatology
  • Risk Management
  • Scientific Discovery and the Future of Medicine
  • Shared Decision Making and Communication
  • Sleep Medicine
  • Sports Medicine
  • Stem Cell Transplantation
  • Substance Use and Addiction Medicine
  • Surgical Innovation
  • Surgical Pearls
  • Teachable Moment
  • Technology and Finance
  • The Art of JAMA
  • The Arts and Medicine
  • The Rational Clinical Examination
  • Tobacco and e-Cigarettes
  • Translational Medicine
  • Trauma and Injury
  • Treatment Adherence
  • Ultrasonography
  • Users' Guide to the Medical Literature
  • Vaccination
  • Venous Thromboembolism
  • Veterans Health
  • Women's Health
  • Workflow and Process
  • Wound Care, Infection, Healing

Get the latest research based on your areas of interest.

Others also liked.

  • Register for email alerts with links to free full-text articles
  • Access PDFs of free articles
  • Manage your interests
  • Save searches and receive search alerts

CBDCs, Payment Firms, and Geopolitics

We analyze the effect of a major central bank digital currency (CBDC) – the digital euro – on the payment industry to find remarkably heterogeneous effects. Stock prices of U.S. payment firms decrease, while stock prices of European payment firms increase in response to positive announcements on the digital euro. Bank stocks do not react. We estimate a loss in market capitalization of USD 127 billion for U.S. payment firms, vis-à-vis a gain of USD 23 billion for European payment firms. Our results emphasize the medium-of-exchange function of CBDCs and point to a novel geopolitical dimension of CBDCs: enhanced autonomy in payments.

We wish to thank Pablo Azar (discussant), Martin Brown, Co-Pierre Georg, Christoph Herpfer, Lars Hornuf (discussant), Charles Kahn (discussant), Christine Parlour (discussant), Pierre-Charles Pradier (discussant), Wenlan Qian (discussant), Christoph Schneider (discussant), Huan Tang (discussant), Jan Toczynski (discussant), Boris Vallée, Yao Zeng, conference participants at the Day-Ahead Workshop on Financial Regulation (Zurich), Conference on Regulating Financial Markets (Frankfurt), EFA Annual Meeting (Barcelona), Queensland Corporate Finance Conference (Brisbane), Bankenworkshop (Münster), NYU Law Fin/Safe-ESCP BS Law & Banking/Finance Conference (Frankfurt), ISB Summer Research Conference (Hyderabad), Annual Meeting of the German Finance Association (Hohenheim), CEMLA/Dallas Fed Financial Stability Workshop (Dallas), Bonn/Mannheim Workshop on Digital Finance (Mannheim), SGF Conference (Zurich), CEPR Webinar on CBDCs and Payments, FIRS (Berlin), and seminar participants at the ABFER Webinar Series, Bayes Business School (London), Deutsche Bundesbank, European Central Bank, Federal Reserve Bank of Chicago, Federal Reserve Bank of New York, Frankfurt School of Finance & Management, FGV EBAPE (Rio de Janeiro), Goethe University (Frankfurt), Hong Kong University, Humboldt University (Berlin), Peking University, SMU Cox School of Business (Dallas), Tuck School of Business (Dartmouth), Tulane University (New Orleans), University of Connecticut, University of Iowa, University of Notre Dame, and University of Nottingham. Jan Keil is supported by grant number KE 2661/1-1 (“Geschäftszeichen”) from the Deutsche Forschungsgemeinschaft. The views expressed herein are those of the authors and do not necessarily reflect the views of the National Bureau of Economic Research.

MARC RIS BibTeΧ

Download Citation Data

More from NBER

In addition to working papers , the NBER disseminates affiliates’ latest findings through a range of free periodicals — the NBER Reporter , the NBER Digest , the Bulletin on Retirement and Disability , the Bulletin on Health , and the Bulletin on Entrepreneurship  — as well as online conference reports , video lectures , and interviews .

2024, 16th Annual Feldstein Lecture, Cecilia E. Rouse," Lessons for Economists from the Pandemic" cover slide

Home

  • DCU Open Days
  • Undergraduate
  • Postgraduate Hub
  • DCU Micro-Credentials
  • DCU Connected
  • Scholarships
  • Admissions Information
  • Accommodation
  • Graduate Studies Office
  • Student Recruitment
  • Research at DCU
  • Research Impact
  • DCU Invent - Technology Transfer
  • Life Sciences Institute
  • INTRA Internships
  • Courses with INTRA
  • Engage with DCU
  • Office of the Executive Director of Engagement
  • Arts and Culture
  • Engagement Governance
  • Age Friendly University
  • DCU Placement
  • DCU Educational Trust
  • DCU International Academy
  • Centre for Talented Youth, Ireland
  • National Institute for Digital Learning
  • DCU Campus Store
  • Changemaker Schools Network
  • Counselling & Personal Development
  • Student Health Service
  • Student Policies
  • Financial Assistance Service
  • House of Accessibility
  • Student Advice and Learning Skills Centre
  • Accessible Campus
  • Transcripts
  • Orientation
  • Examinations
  • Examination Results
  • Fees Information
  • Academic Calendars
  • Information Systems Services
  • DCU Students Union
  • Clubs & Societies
  • DCU Autism Friendly
  • Disability & Learning Support Service
  • Mature Students
  • Careers Service
  • International Students
  • DCU Business School
  • DCU Institute of Education
  • Faculty of Engineering & Computing
  • Faculty of Humanities & Social Sciences
  • Faculty of Science & Health
  • Office of the President
  • Sustainability at DCU
  • DCU Governing Authority
  • Freedom of Information
  • Health & Safety
  • University Policies
  • Graduate Studies
  • Office of the Vice President for Research
  • Communications, Marketing & Events
  • Information Systems Services (ISS)
  • Language Translation Services
  • Quality and Institutional Insights Office
  • Teaching Enhancement Unit (TEU)
  • How to get here
  • Inter-Faith Centre

DCU News

  • Postgraduate
  • Faculty Micro-credentials
  • Faculty Testimonials
  • Doctoral Research Hub
  • Faculty Fellowships
  • Faculty Research Ethics Website
  • Research Impact Stories
  • Research Seminars
  • Centres and Institutes
  • Teaching and Learning Scholarship
  • Dean's Honours List
  • News and Events
  • Faculty At-A-Glance
  • Get in Touch

IGC 2024 at The Helix

Citizen science and community empowerment a key theme at International Geographical Congress in Dublin City University

The power of grassroots community organisation and citizen science is one of the key themes of the research being showcased at the 35th International Geographical Congress (IGC), taking place this week in the Helix in Dublin City University. The congress, which brings together thousands of geographers from across the globe, is being hosted for the first time in Ireland. The congress’  public engagement programme , which is supported by Dublin City Council will bring the conference beyond the campus to the wider public.

Researchers from six schools in the university will present their work across the six days of the congress, which runs from August 25th through to August 30th

Selected papers from DCU academics being presented include

Monitoring water quality and engaging the community

  • Urban Citizen's 6.3.2: the active role of citizens in monitoring water quality and biodiversity in Dublin’s rivers and streams - examining the power of citizen science and community engagement to monitor water quality and how these projects can benefit our society, riverine ecosystems and water management.
  • Applying citizen science to monitoring landslides on Ireland's shoreline - coastal landslides are a significant hazard to coastal communities and infrastructure. The ACCOMPLISH project looks at the value of citizen monitoring of these landslides and examining the motivations and challenges of those volunteering.
  • Valuing natural capital in communities for health - natural capital is the value of everything that comes from nature; soil, air, water and all living creatures. Focusing on the Ballymun area, this study looks at the benefits we gain from natural capital and its importance in our urban centres.
  • Occurrence of Poly- and Perfluoroalkyl Substances (PFAS) in Transitional and Marine Water along the Dublin Bay Biosphere - determining the concentration of PFAS, often referred to as Forever Chemicals, in the waters in and around Dublin Bay.
  • Persistent, Mobile and Toxic as well as very Persistent very Mobile chemicals in surface water and coastal areas - focusing on agricultural and pharmaceutical sources, this study looks at where the chemicals come from and where they end up.

Planning, history and heritage

  • Place and street naming in Ireland: identity, conflict and resistance - examining the evolution of multilingual place and street naming on the island of Ireland.
  • Challenges and opportunities of planning for adaptation in an overly-centralised country - how Ireland’s overly centralised governance is affecting the response to the climate crisis.

Sustainability and climate justice

  • Including children and young people in environmental decision-making - discussing the importance of giving a voice to young people on environmental issues by exploring lessons from Ireland’s Children and Young People’s Assembly on Biodiversity Loss. 
  • Embedding Critical Climate Justice Literacy in Climate Change Education: A Critical Exploration of Hope, Agency and Resilience

Professor Anindita Datta

Congress chair  Prof Niamh Moore-Cherry , Dean of Social Sciences and College Principal in the UCD College of Social Sciences and Law, said

“Hosting the 35th International Geographical Congress in Ireland is an unparalleled opportunity for us to highlight the central role of geography as a discipline in addressing all of the major environmental and societal challenges facing humanity today. Most importantly, by bringing together geographers from more than 80 countries around the world, we are harnessing the best global knowledge, expertise and insights to generate real impact for communities locally, nationally and globally."

Dr Jonathan Cherry , from DCU’s School of History and Geography said

“I am delighted that this quadrennial Olympics of the discipline of Geography will  meet at Dublin City University for IGC Dublin 2024. Geographers from DCU School of History and Geography alongside colleagues from related disciplines whose work embraces geographical education, approaches and themes will present our research and host our international colleagues.  DCU’s Glasnevin campus provides the home for this ‘festival of geography’ and our public engagement programme including the ‘Circus of Climate Horrors’ and the ‘City of Care’ photo exhibition, showcasing the lived experience of long-established communities in the Liberties, will be open to the wider university community and general public ensuring that we create an inclusive conference without walls.”

Attendees at the first day of the IGC 2024

About the IGC

The IGC is organised by the  Geographical Society of Ireland (GSI) and the  International Geographical Union (IGU) .

The GSI is the professional representative organisation of geographers in Ireland. It was founded in 1934.Over eighty years later, the GSI continues to raise awareness of the value and impact of geography in Ireland and beyond, through a diverse range of activities and collaborations. 

The IGU is an international, non-governmental, professional organisation devoted to the development of the discipline of geography. It promotes geography through initiating and coordinating geographical research and teaching in all countries of the world. 

The IGU hosts the International Geographical Congress every four years and also promotes regional conferences and other meetings that further the objectives of the union.

IMAGES

  1. 🎉 How to set up a research paper. How to Create a Structured Research

    public key research paper

  2. Developing a Final Draft of a Research Paper

    public key research paper

  3. How to Write a Research Paper in English

    public key research paper

  4. Public Policy Analysis Research paper

    public key research paper

  5. Tips For How To Write A Scientific Research Paper

    public key research paper

  6. 1 key research papers relevant to this study

    public key research paper

COMMENTS

  1. Systematic and Critical Review of RSA Based Public Key Cryptographic

    Public key Cryptography provides a set of cryptographic algorithms in achieving data security through confidentiality, integrity and authentication. Among all cryptographic algorithms in general and public key cryptography in particular, RSA is one of the most widely used and applied algorithms.

  2. Provably secure public key encryption with keyword search for data

    The proposed scheme can resist keyword-guessing attacks, and offer ciphertext and trapdoor indistinguishability properties. We use the data owner's private key during encryption to prevent keyword-guessing attacks. Using the data owner's public key in the verification phase ensures the resilience of keyword-guessing attacks.

  3. RSA Public Key Cryptography Algorithm

    PDF | This paper aims to review RSA, examine its strengths and weaknesses, and propose novel solutions to overcome the weakness. RSA (Rivest, Shamir,... | Find, read and cite all the research you ...

  4. 23203 PDFs

    Explore the latest full-text research PDFs, articles, conference papers, preprints and more on PUBLIC KEY CRYPTOGRAPHY. Find methods information, sources, references or conduct a literature review ...

  5. SR-PEKS: Subversion-Resistant Public Key Encryption With Keyword Search

    Public key encryption with keyword search (PEKS) provides secure searchable data encryption in cloud storage. Users can outsource encrypted data and keywords to a cloud server, and search target one without disclosing sensitive information. To achieve resistance against off-line keyword guessing attacks, existing practical PEKS schemes employ independent key server(s) to assist users in ...

  6. Data Encryption and Authetication Using Public Key Approach

    Today various numbers of diverse applications that include e- payments in secure commerce and payment applications to provide security for their commu…

  7. Cryptography

    This Special Issue aims to provide a platform for researchers to publish high-quality and original research papers presenting the recent development and state-of-the-art solutions on all the aspects of public key cryptography.

  8. Public key authenticated encryption with keyword search: revisited

    In 2017, the notion of public key authenticated encryption with keyword search (PAEKS) and its security model was defined by Huang and Li. Their main motivation was providing security against inside ...

  9. Provably secure public-key encryption with conjunctive and subset

    Public-key encryption with keyword search (PEKS) schemes enable public key holders to encrypt documents, while the secret key holder is able to generate queries for the encrypted data. In this paper, we present two PEKS schemes with extended functionalities. The first proposed scheme supports conjunctive queries. That is, it enables searching for encrypted documents containing a chosen list of ...

  10. Certificateless Public Key Cryptography

    Abstract. This paper introduces and makes concrete the concept of certificateless public key cryptography (CL-PKC), a model for the use of public key cryptography which avoids the inherent escrow of identity-based cryptography and yet which does not require certificates to guarantee the authenticity of public keys.

  11. SOK: Research Motivations of Public-Key Cryptography

    The design, proposal, and analysis of cryptographic primitives and protocols (schemes) are one of the primary research fields in cryptology. To advance this research field, it is crucial to fully understand their research motivations. In this paper, we systematically introduce the research motivations for designing and proposing new schemes in public-key cryptography. We found that all ...

  12. Comparative Analysis of Cryptographic Key Management Systems

    A typical example of a large scale KMS is a public-key infrastructure PKI, which uses hierarchical digital certificates for authentication and public keys for encryption. Given their necessity for current IT infrastructure, several key management methods and tools are available on the market, varying in terms of cost, complexity and use cases.

  13. Research on Certificateless Public Key Cryptography

    This paper revisits, analyzes, compares, and briefly reviews some of the main results of the study of CL-PKC, and discusses some existing problems in this research field that deserve further investigation. Certificateless public key cryptography (CL-PKC for short) is a new type of public key cryptography, which is developed on the foundation of identity based cryptography (ID-PKC for short ...

  14. Analysis Review on Public Key Cryptography Algorithms

    This paper presents several Public Key Cryptography (PKC) algorithms based on the perspective of researchers‟ effort since it was invented in the last four decades. The categories of the ...

  15. Certificateless Public Key Cryptography: A Research Survey

    In this paper, we survey various public key encryption schemes on certificateless setting with the security model and discuss the performance. Also, we present the generic model of Certificateless Public Key Encryption (CL-PKE) scheme proposed by various authors.

  16. Public key cryptography

    Public key cryptography. Abstract: The RSA algorithm can be used for a kind of unforgeable digital signature. In this application, the secret key is used to encrypt a message, which can then itself be decrypted by anyone possessing the public key. Digital signatures can play a role in many activities that do not require secrecy but require ...

  17. Public Key Encryption with Keyword Search Revisited

    The public key encryption with keyword search (PEKS) scheme, proposed by Boneh, Di Crescenzo, Ostrovsky and Persiano, enables one to search for encrypted keywords without compromising the security of the original data. In this paper, we address two important issues of a PEKS scheme, "removing secure channel" and "refreshing keywords", which ...

  18. PDF A Method for Obtaining Digital Signatures and Public-Key Cryptosystems

    A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. R.L. Rivest, A. Shamir, and L. Adleman. Abstract An encryption method is presented with the novel property that publicly re- vealing an encryption key does not thereby reveal the corresponding ...

  19. Blockchain-based public key encryption with keyword search for medical

    Abstract The cloud-based sharing of electronic health data (EHDs) has great significance in researching diseases, doctors' diagnoses and various fields. In this paper, we applied the potentiality of both blockchain and public key searchable encryption to build a medical data-sharing platform. In recent years, blockchain has emerged as a promising solution for medical data sharing with ...

  20. Public-key cryptography

    Public-key cryptography. An unpredictable (typically large and random) number is used to begin generation of an acceptable pair of keys suitable for use by an asymmetric key algorithm. In an asymmetric key encryption scheme, anyone can encrypt messages using a public key, but only the holder of the paired private key can decrypt such a message.

  21. What Is a Public Key?

    A public key is a type of cryptographic code that's used to encrypt and decrypt sensitive information. "Keys" in cryptography are pieces of information that scramble data so it' is uninterpretable without an algorithm specifically designed to unlock the information. A public key, along with its counterpart, a private key, forms the ...

  22. The paper most likely to give you a paper cut, according to science

    Andrew Paul is Popular Science's staff writer covering tech news.Previously, he was a regular contributor to The A.V. Club and Input, and has had recent work featured by Rolling Stone, Fangoria ...

  23. The "Pink Tax" and Gender Price Disparity in Personal Care

    The study provides a comprehensive overview of the Pink Tax's evolution, key research findings, public responses, and regulatory measures to address this issue. By synthesising existing research and case studies, this paper highlights the economic burden imposed on women and the reinforcement of gender stereotypes through market practices.

  24. Catalyzing a Movement to Produce Greater Public, Private, and Civil

    The paper reviews the range of evidence regarding contemporary US housing conditions and physical performance, the effectiveness of home repairs, and the current landscape of public- and civil-sector programs that provide repairs and the evolving advocacy that has established these programs. ... We conduct rigorous research to advance policy ...

  25. 2024 Most Valuable Public Health Degree Programs Ranking ...

    Key benefits of getting a Public Health degree in Boston, MA . Salary for Public Health Degree Graduates: Graduates with a Public Health degree in Boston can expect competitive salaries, with Community Health Workers earning an average of $49,900 annually, while Health Educators make around $66,710. Environmental Health Specialists and ...

  26. (PDF) Public-key Infrastructure

    This paper presents the profiles related to public-key Infrastructure (PKI) for the Internet. The PKI manages public keys automatically through the use of public-key certificates. It provides a ...

  27. Conducting Research in the New Abortion Care Policy Landscape

    The public policy chaos fueled by the June 2022 Dobbs v Jackson Women's Health Organization Supreme Court decision has created a critical need for objective and high-quality abortion policy evaluation research. Stevenson and Root 1 rose to this challenge by conducting a convincing analysis of recent trends in maternal mortality, motivated in part by pro-life advocate claims that the recent ...

  28. Free Zone Public Consultation Paper

    Deloitte held a webinar on 25 July 2023 which provided insight into the key highlights of the Consultation Paper, its impact on free zone businesses, and the possible interpretations that businesses should consider when responding to the Consultation Paper. ... Free Zone Public Consultation Paper Print. On 19 July 2023, the United Arab Emirates ...

  29. CBDCs, Payment Firms, and Geopolitics

    Founded in 1920, the NBER is a private, non-profit, non-partisan organization dedicated to conducting economic research and to disseminating research findings among academics, public policy makers, and business professionals.

  30. Citizen science and community empowerment a key theme at International

    Research from DCU examines citizen's role in monitoring water quality locally and keeping track of landslides on the Irish shoreline Papers on the presence of PFAS in Dublin Bay, place and street naming in Ireland and the inclusion of children and young people in environmental decision making will also be presented at the congress