Results 31 to 40 of about 35,576 (230)
Simple Generalized Group‐Oriented Cryptosystems Using ElGamal Cryptosystem [PDF]
Summary: In the generalized group-oriented cryptosystem, the sender can send a conditional message to a group of users such that only the specified sets of users in this group can cooperate to decrypt this message. We use an ElGamal cryptosystem and an elliptic curve ElGamal cryptosystem to achieve the purposes of generalization and group-orientation ...
Chou‐Chen Yang+3 more
openalex +4 more sources
A Lucas based cryptosystem analog to the ElGamal cryptosystem and elliptic curve cryptosystem [PDF]
In this paper, a new cryptosystem will be developed which is analogue to ElGamal encryption scheme and based on Lucas sequence in the elliptic curve group over finite field. In this encryption scheme, an Elliptic curve Diffie-Hellman (ECDH) key agreement be the first part of the encryption, the keys of this encryption scheme is defined based on ...
Mohamed Othman+3 more
openaire +2 more sources
Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT
In recent years, the Internet of Things (IoT) has found wide application and attracted much attention. Since most of the end-terminals in IoT have limited capabilities for storage and computing, it has become a trend to outsource the data from local to ...
Hongyang Yan+3 more
doaj +1 more source
Quantum Cryptography Based on the Time--Energy Uncertainty Relation [PDF]
A new cryptosystem based on the fundamental time--energy uncertainty relation is proposed. Such a cryptosystem can be implemented with both correlated photon pairs and single photon states.Comment: 5 pages, LaTex, no ...
A. K. Ekert+23 more
core +2 more sources
Fast Cramer-Shoup Cryptosystem [PDF]
Cramer-Shoup was the first practical adaptive CCA-secure public key encryption scheme. We propose a faster version of this encryption scheme, called Fast Cramer-Shoup. We show empirically and theoretically that our scheme is faster than three versions proposed by Cramer-Shoup in 1998. We observe an average gain of 60% for the decryption algorithm.
Lafourcade, Pascal+2 more
openaire +3 more sources
Encryption using semigroup action
Anencipheringtransformationisafunctionf thatconvertsanyplaintext message into a ciphertext message and deciphering transformation is a function f−1, which reverse the process. Such a set-up is calledacryptosystem. Inthispaper,weextendageneralizationofthe
Indira Devi Anooja+2 more
doaj +1 more source
Quantum cryptography based on photon ``frequency'' states: example of a possible realization [PDF]
A quantum cryptosystem is proposed using single-photon states with different frequency spectra as information carriers.
Molotkov, S. N.
core +2 more sources
Cryptanalysis of a novel cryptosystem based on chaotic oscillators and feedback inversion [PDF]
An analysis of a recently proposed cryptosystem based on chaotic oscillators and feedback inversion is presented. It is shown how the cryptosystem can be broken when Duffing's oscillator is considered.
Devaney+7 more
core +2 more sources
Generalized Fibonacci Sequences for Elliptic Curve Cryptography
The Fibonacci sequence is a well-known sequence of numbers with numerous applications in mathematics, computer science, and other fields. In recent years, there has been growing interest in studying Fibonacci-like sequences on elliptic curves.
Zakariae Cheddour+2 more
doaj +1 more source
Models of interaction of cryptography and chaotic dynamics
Cryptography deals with the problem of information protection by its transformation, providing the protection of information (by means of computational techniques), i.e. a set of agreed encryptian tools.
B.K. Shayakhmetova+3 more
doaj +1 more source