Concepedia

Concept

Data Security

Parents

Children

118.5K

Publications

6.6M

Citations

167.6K

Authors

11.7K

Institutions

Public-Key Cryptography Foundations

1975 - 1990

The period saw the rise and consolidation of public-key cryptography and probabilistic encryption as the foundation for secure digital interactions, enabling practical key exchange, digital signatures, and trusted identities in distributed networks. Researchers developed robust secure network protocols and encryption mechanisms that address authentication, confidentiality, and data integrity over insecure channels, establishing frameworks for public-key infrastructures and secure communications across the Internet. The emphasis on randomness and probabilistic constructs deepened understanding of cryptographic strength, with formal results on pseudorandom generation and the security properties of encryption schemes. Data-centric security concerns began to shape approaches to privacy in statistical databases and information-flow control in distributed systems.

Public-key cryptography (PKC) and digital signatures underpin trust in distributed interactions, shaping PKI, signature schemes, and algebraic constructions for secure identity and data integrity [1], [4], [9], [15].

Secure network communications and protocol mechanisms address authentication, confidentiality, and integrity over insecure channels, fusing encryption, secure access, and high-level protocol protections [2], [3], [5], [12], [13].

Foundations of cryptographic strength emphasize randomness and probabilistic constructs—pseudorandom generation and encryption schemes—forming the bedrock of secure encryption and analysis of key robustness [4], [16], [17].

Security in data-centric environments emphasizes protecting statistical databases and enforcing information-flow constraints in distributed systems, guiding data privacy and access control [8], [11], [18].

Side-Channel Aware Protocols

1991 - 1997

Universally Composable Security

1998 - 2004

Attribute-Based Data Sharing

2005 - 2010

Privacy-Preserving Encrypted Cloud Computing

2011 - 2017

Privacy-Preserving IoT-Cloud Security

2018 - 2024