Zobrazeno 1 - 10
of 66
pro vyhledávání: '"IND-CPA"'
Autor:
Ekta Bindal, Abhay Kumar Singh
Publikováno v:
IEEE Access, Vol 12, Pp 35586-35596 (2024)
This paper introduces a variant of the McEliece cryptosystem and employs the $(C_{1}, C_{1} + C_{2})$ -construction to generate a new code from two arbitrary linear codes. We propose an efficient hard-decision decoding algorithm for linear codes deri
Externí odkaz:
https://doaj.org/article/f6bc0dece7ff4c3f8b3d8ee96a7a37eb
Publikováno v:
Jisuanji kexue, Vol 49, Iss 5, Pp 341-346 (2022)
Full homomorphic encryption (FHE) supports arbitrary computation on the ciphertext without the requirement of decryption,which provides protection for privacy security in cloud computing.However,the current FHE scheme constructed using the approximat
Externí odkaz:
https://doaj.org/article/4d6b8f4a87d642e9b5877b4f84f6d765
Publikováno v:
Algorithms, Vol 15, Iss 7, p 229 (2022)
For the feature selection problem, we propose an efficient privacy-preserving algorithm. Let D, F, and C be data, feature, and class sets, respectively, where the feature value x(Fi) and the class label x(C) are given for each x∈D and Fi∈F. For a
Externí odkaz:
https://doaj.org/article/858676c3f94f497e9c09e1245349b119
Publikováno v:
Applied Sciences, Vol 12, Iss 9, p 4353 (2022)
In e-health systems, patients encrypt their personal health data for privacy purposes and upload them to the cloud. There exists a need for sharing patient health data with doctors for healing purposes in one’s own preferred order. To achieve this
Externí odkaz:
https://doaj.org/article/2bd577fb67744f609268802fc86cec91
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Access, Vol 6, Pp 23137-23151 (2018)
As many services have been subcontracted to the cloud, data in such services (i.e., management applications, signal processing, and so on) are stored on cloud in encrypted form for protecting user private information. In many emerging data and signal
Externí odkaz:
https://doaj.org/article/ab384d8f23f04c0c9b6247e729c9e2db
Autor:
Peng Zeng, Kim-Kwang Raymond Choo
Publikováno v:
IEEE Access, Vol 6, Pp 70017-70024 (2018)
Secure cloud storage has important applications in our big data-driven society, and to achieve secure cloud storage, we need to enforce strong access control mechanism. Proxy re-encryption (PRE) has been shown to be an effective tool of constructing
Externí odkaz:
https://doaj.org/article/30db4afc8a1840dbbd50caa45e2df238
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
El Laz, Mohamad
Publikováno v:
Cryptography and Security [cs.CR]. Université Côte d'Azur, 2022. English. ⟨NNT : 2022COAZ4006⟩
This thesis proposes the use of provable encryption schemes to obtain end-to-end security of distributed systems. We first analyze sufficient conditions of a provable encryption scheme used in voting systems and discover several inconsistencies in th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______165::7b6c975d1d8e57a0d1ee23580323f3d8
https://theses.hal.science/tel-03814201v2/file/2022COAZ4006.pdf
https://theses.hal.science/tel-03814201v2/file/2022COAZ4006.pdf
Autor:
Beskorovajnov, Wasilij, Gröll, Roland, Müller-Quade, Jörn, Ottenhues, Astrid, Schwerdt, Rebecca
Encryption satisfying CCA2 security is commonly known to be unnecessarily strong for realizing secure channels. Moreover, CCA2 constructions in the standard model are far from being competitive practical alternatives to constructions via random oracl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::01895ccd6e9e81e1ffe7c8e69bae1aef