Results 31 to 40 of about 35,576 (230)

Simple Generalized Group‐Oriented Cryptosystems Using ElGamal Cryptosystem [PDF]

open access: bronzeInformatica, 2003
Summary: In the generalized group-oriented cryptosystem, the sender can send a conditional message to a group of users such that only the specified sets of users in this group can cooperate to decrypt this message. We use an ElGamal cryptosystem and an elliptic curve ElGamal cryptosystem to achieve the purposes of generalization and group-orientation ...
Chou‐Chen Yang   +3 more
openalex   +4 more sources

A Lucas based cryptosystem analog to the ElGamal cryptosystem and elliptic curve cryptosystem [PDF]

open access: yesAIP Conference Proceedings, 2014
In this paper, a new cryptosystem will be developed which is analogue to ElGamal encryption scheme and based on Lucas sequence in the elliptic curve group over finite field. In this encryption scheme, an Elliptic curve Diffie-Hellman (ECDH) key agreement be the first part of the encryption, the keys of this encryption scheme is defined based on ...
Mohamed Othman   +3 more
openaire   +2 more sources

Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT

open access: yesSensors, 2018
In recent years, the Internet of Things (IoT) has found wide application and attracted much attention. Since most of the end-terminals in IoT have limited capabilities for storage and computing, it has become a trend to outsource the data from local to ...
Hongyang Yan   +3 more
doaj   +1 more source

Quantum Cryptography Based on the Time--Energy Uncertainty Relation [PDF]

open access: yes, 1996
A new cryptosystem based on the fundamental time--energy uncertainty relation is proposed. Such a cryptosystem can be implemented with both correlated photon pairs and single photon states.Comment: 5 pages, LaTex, no ...
A. K. Ekert   +23 more
core   +2 more sources

Fast Cramer-Shoup Cryptosystem [PDF]

open access: yesProceedings of the 18th International Conference on Security and Cryptography, 2021
Cramer-Shoup was the first practical adaptive CCA-secure public key encryption scheme. We propose a faster version of this encryption scheme, called Fast Cramer-Shoup. We show empirically and theoretically that our scheme is faster than three versions proposed by Cramer-Shoup in 1998. We observe an average gain of 60% for the decryption algorithm.
Lafourcade, Pascal   +2 more
openaire   +3 more sources

Encryption using semigroup action

open access: yesRatio Mathematica, 2021
Anencipheringtransformationisafunctionf thatconvertsanyplaintext message into a ciphertext message and deciphering transformation is a function f−1, which reverse the process. Such a set-up is calledacryptosystem. Inthispaper,weextendageneralizationofthe
Indira Devi Anooja   +2 more
doaj   +1 more source

Quantum cryptography based on photon ``frequency'' states: example of a possible realization [PDF]

open access: yes, 1998
A quantum cryptosystem is proposed using single-photon states with different frequency spectra as information carriers.
Molotkov, S. N.
core   +2 more sources

Cryptanalysis of a novel cryptosystem based on chaotic oscillators and feedback inversion [PDF]

open access: yes, 2003
An analysis of a recently proposed cryptosystem based on chaotic oscillators and feedback inversion is presented. It is shown how the cryptosystem can be broken when Duffing's oscillator is considered.
Devaney   +7 more
core   +2 more sources

Generalized Fibonacci Sequences for Elliptic Curve Cryptography

open access: yesMathematics, 2023
The Fibonacci sequence is a well-known sequence of numbers with numerous applications in mathematics, computer science, and other fields. In recent years, there has been growing interest in studying Fibonacci-like sequences on elliptic curves.
Zakariae Cheddour   +2 more
doaj   +1 more source

Models of interaction of cryptography and chaotic dynamics

open access: yesҚарағанды университетінің хабаршысы. Математика сериясы, 2019
Cryptography deals with the problem of information protection by its transformation, providing the protection of information (by means of computational techniques), i.e. a set of agreed encryptian tools.
B.K. Shayakhmetova   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy