Zobrazeno 1 - 10
of 284
pro vyhledávání: '"Cramer–Shoup cryptosystem"'
Publikováno v:
Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021
18th International Conference on Security and Cryptography, SECRYPT 2021
18th International Conference on Security and Cryptography, SECRYPT 2021, Jul 2021, Online, France. ⟨10.5220/0010580607660771⟩
SECRYPT
18th International Conference on Security and Cryptography, SECRYPT 2021
18th International Conference on Security and Cryptography, SECRYPT 2021, Jul 2021, Online, France. ⟨10.5220/0010580607660771⟩
SECRYPT
International audience; Cramer-Shoup was the first practical adaptive CCA-secure public key encryption scheme. We propose a faster version of this encryption scheme, called Fast Cramer-Shoup. We show empirically and theoretically that our scheme is f
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::03df3d3655ccc409e672a9a3f378ee27
https://hal.science/hal-03419423/document
https://hal.science/hal-03419423/document
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Fang-Yu Rao
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 16:725-728
Recently, based on the Paillier cryptosystem [1] , Yi et al. outline a distributed ElGamal cryptosystem which allows for both a much simpler distributed key generation procedure and a more efficient distributed decryption of messages from a large pla
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Thang Manh Hoang, Hoang Xuan Thanh
Publikováno v:
Optik. 155:366-383
This paper presents the weaknesses in the cryptosystem proposed by W. Zhang and his colleagues. The proposed method to restore the permutation rule is based on the chosen-ciphertext attack. The method is successful in restoration of the permutation r
Publikováno v:
Optik. 147:88-102
Elliptic curve analogue ElGamal encryption scheme requires encoding of the plain message onto elliptic curve coordinate using Koblitz encoding technique before encryption operation. The paper proposes a medical image encryption scheme using improved
Autor:
Xueju Shen, Jianjun Cai
Publikováno v:
Optics & Laser Technology. 95:105-112
We propose a modified optical asymmetric cryptosystem based on coherent superposition and equal modulus decomposition (EMD). In the encryption process, the asymmetric cells of the previous cryptosystem is cascaded, while some small changes are made.
Autor:
Vishal Snedan Robertson, Anish Thali, Shreedatta Sawant, Anuj Shetgaonkar, Vaishnavi Kamat, Sneha Kamat
Publikováno v:
IOSR Journal of Computer Engineering. 19:75-79
Publikováno v:
IEEE Communications Letters. 21:971-974
Esmaeili and Gulliver recently proposed a secret key cryptosystem based on error-correcting codes in which a codeword modified by random insertions, deletions, and errors is used as a ciphertext. The secret keys used in this cryptosystem consist of r
Autor:
Nam Yul Yu
Publikováno v:
IEEE Signal Processing Letters. 24:181-185
The principle of compressed sensing (CS) can be applied to a cryptosystem in which the sensing matrix is employed for the secret key. In this letter, we study the security of a CS-based cryptosystem that encrypts a plaintext with a secret circulant m