Zobrazeno 1 - 10
of 1 373
pro vyhledávání: '"Plaintext-aware encryption"'
Publikováno v:
IEEE Transactions on Services Computing. 13:1142-1151
ABKS has drawn much attention from research and industry in recent years, an ABKS scheme is an encryption scheme that supports keyword search and access control. Attribute-Based Encryption is a public key encryption that enables users to encrypt and
Autor:
Shafali Agarwal
An increasing demand of secure data transmission over internet leads to the challenge of implementing a consistent cryptosystem. In 2004, USA navy published the patent which highlights the importance of fractal as an encryption/decryption key in a cr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::616009c854c49a4a32f9e934151d1d3a
Autor:
Fang-Yu Rao
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 16:725-728
Recently, based on the Paillier cryptosystem [1] , Yi et al. outline a distributed ElGamal cryptosystem which allows for both a much simpler distributed key generation procedure and a more efficient distributed decryption of messages from a large pla
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 31, Iss 1, Pp 92-104 (2019)
Although many encryption methods are available, there is always an ongoing need for more to resist the adversaries’ ever-growing analytical skills and techniques. We propose in this paper an innovative method for text encryption. We devise a random
Autor:
Shijun Xiang, Xinrong Luo
Publikováno v:
IEEE Transactions on Circuits and Systems for Video Technology. 28:3099-3110
This paper proposes a novel reversible data hiding scheme for encrypted images by using homomorphic and probabilistic properties of Paillier cryptosystem. In the proposed method, groups of adjacent pixels are randomly selected, and reversibly embedde
Publikováno v:
ResearcherID
The study of sending and receiving secret messages is called cryptography. Generally, senders and receivers are unaware about the process of encryption and decryption. Hence, encryption plays an important role in data communication and data security.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c4b99d0e2b78df51ad713d2848e52d5c
http://arxiv.org/abs/2005.00157
http://arxiv.org/abs/2005.00157
Publikováno v:
Journal of Cryptology
Bellare, Boldyreva, and O’Neill (CRYPTO ’07) initiated the study of deterministic public-key encryption as an alternative in scenarios where randomized encryption has inherent drawbacks. The resulting line of research has so far guaranteed securi
Publikováno v:
Information Sciences. 429:88-101
Database encryption is essential for cloud database systems. For a large database, decryption could take a lot of computational time. Therefore, verifying an encryption that contains a correct plaintext without decryption becomes significant for a la
Publikováno v:
Signal Processing. 143:122-133
In this paper, a new two-dimensional Logistic ICMIC cascade map (2D-LICM) is proposed based on cascade modulation couple (CMC) model. Performance evaluations show that it has hyperchaotic behavior, wide chaotic range and large complexity. Based on th
Autor:
Thang Manh Hoang, Hoang Xuan Thanh
Publikováno v:
Optik. 155:366-383
This paper presents the weaknesses in the cryptosystem proposed by W. Zhang and his colleagues. The proposed method to restore the permutation rule is based on the chosen-ciphertext attack. The method is successful in restoration of the permutation r