Cryptography and Data Security
Modern cryptography has moved well beyond keeping messages secret: researchers now study how to compute on encrypted data without ever decrypting it, how to share sensitive computations across mutually untrusting parties, and how to prove knowledge of a secret without revealing the secret itself. These goals matter because data increasingly lives in cloud systems and crosses institutional boundaries, making it necessary to enforce privacy and access control even when the underlying infrastructure cannot be fully trusted. A central open challenge is making schemes like homomorphic encryption and secure multi-party computation fast enough for real-world deployment, since their theoretical guarantees currently come with steep computational costs. Alongside efficiency, researchers are working to build cryptographic foundations — particularly lattice-based constructions — that remain secure against quantum computers, which would break most of the public-key infrastructure the internet relies on today.
- Works
- 81,888
- Total citations
- 1,523,121
- Keywords
- Homomorphic EncryptionIdentity-Based EncryptionAttribute-Based EncryptionLattice-based CryptographySecure Multi-party ComputationSearchable Encryption
Top papers in Cryptography and Data Security
Ordered by total citation count.
- How to share a secret↗ 13,371OA
- A method for obtaining digital signatures and public-key cryptosystems↗ 13,135
- A method for obtaining digital signatures and public-key cryptosystems↗ 13,008OA
- A public key cryptosystem and a signature scheme based on discrete logarithms↗ 7,996
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes↗ 7,144
- Identity-Based Encryption from the Weil Pairing↗ 7,004
- Calibrating Noise to Sensitivity in Private Data Analysis↗ 6,952
- Identity-Based Cryptosystems and Signature Schemes↗ 6,630
- Fully homomorphic encryption using ideal lattices↗ 6,479
- The Byzantine Generals Problem↗ 5,925OA
- Federated Machine Learning↗ 5,694
- On the security of public key protocols↗ 5,609
Active researchers
Top authors in this area, ranked by h-index.