Zobrazeno 1 - 10
of 2 415
pro vyhledávání: '"ElGamal"'
Publikováno v:
International Journal of Pervasive Computing and Communications, 2022, Vol. 20, Issue 5, pp. 607-619.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/IJPCC-06-2022-0240
Publikováno v:
Surveys in Mathematics and its Applications, Vol 19 (2024), Pp 301-316 (2024)
This work presents a new public key cryptography encryption-decryption scheme based on generalized Fibonacci matrices and the Hill cipher. This scheme proposes using Fibonacci sequences under prime modulo for key establishment. This scheme exchanges
Externí odkaz:
https://doaj.org/article/3c8ee2e162f14919a54fb312cebb687f
Publikováno v:
IEEE Access, Vol 12, Pp 162825-162843 (2024)
This article presents a novel e-voting scheme that combines Group Identity-based Identification (GIBI) with Homomorphic Encryption (HE) based on the discrete logarithmic assumption. The proposed scheme uses the Schnorr-like GIBI scheme for voter iden
Externí odkaz:
https://doaj.org/article/eb5af7646126446c81c7899bbe9cec91
Publikováno v:
Digital Communications and Networks, Vol 10, Iss 2, Pp 355-368 (2024)
As an emerging joint learning model, federated learning is a promising way to combine model parameters of different users for training and inference without collecting users’ original data. However, a practical and efficient solution has not been e
Externí odkaz:
https://doaj.org/article/fdb28e63ac58430b8c23032a951c2206
Publikováno v:
Heliyon, Vol 10, Iss 11, Pp e31542- (2024)
Considering the granularity of embedded data in the design of reversible data hiding scheme has important research significance for the permission control and management of multi-granularity information. To broaden the application possibilities of en
Externí odkaz:
https://doaj.org/article/2609439d6c854ace85580c3025541b90
Publikováno v:
Photonics, Vol 11, Iss 9, p 878 (2024)
This paper proposes an asymmetric scanning holography cryptosystem based on the Elgamal algorithm. The method encodes images with sine and cosine holograms. Subsequently, each hologram is divided into a signed bit matrix and an unsigned hologram matr
Externí odkaz:
https://doaj.org/article/97355d3a7d5244b48341f73d34fd723f
Publikováno v:
Cryptography, Vol 8, Iss 3, p 42 (2024)
In this paper, we propose a smart contract-based multi-candidate self-tallying voting scheme in order to guarantee the privacy of ballots in the case of multiple candidates. This scheme uses the ElGamal cryptosystem to ensure the security of the ball
Externí odkaz:
https://doaj.org/article/ea658d9629aa4210bfa78036d31b89fc
Autor:
Hiba A. Khalaf, Rifaat Z. Khalaf
Publikováno v:
Academic Science Journal, Vol 2, Iss 1 (2024)
In composition theory, computer security, and engineering are all closely related fields under which cryptography, a technology that deals with data security, falls. However, the complexity of cryptographic systems must be increased due to the attack
Externí odkaz:
https://doaj.org/article/9ef47652ce2b4089adbf164fb1aa217c
Autor:
Jyothi Peta, Srinivas Koppu
Publikováno v:
IEEE Access, Vol 11, Pp 61866-61880 (2023)
In recent decades, the mortality rate of breast cancer in females is rapidly increasing because of unawareness and failed to detect in earlier stages. In existing, several studies are attempted to develop a robust mechanism for detecting breast cance
Externí odkaz:
https://doaj.org/article/e33dc408010f420582f1cf524f1cc366
Publikováno v:
Entropy, Vol 26, Iss 2, p 154 (2024)
Today, safeguarding sensitive content through encryption is crucial. This work presents a hybrid cryptosystem for images that employs both asymmetric and symmetric encryption. The asymmetric component involves applying the Diffie–Hellman protocol a
Externí odkaz:
https://doaj.org/article/d620d954df8647c7975195d822cbcfbf