A simple generalization of El-Gamal cryptosystem to non-abelian groups [PDF]
In this paper we study the MOR cryptosystem. We use the group of unitriangular matrices over a finite field as the non-abelian group in the MOR cryptosystem. We show that a cryptosystem similar to the El-Gamal cryptosystem over finite fields can be built using the proposed groups and a set of automorphisms of these groups.
arxiv
ShaEr: A Blockchain‐Based Framework for Secure Medical Data Sharing and Monetisation
This paper presents a novel framework to enable secure medical data sharing and monetisation that utilises the inherent features of blockchain to establish a robust and transparent framework. It presents a reward policy aimed at incentivising data owners to share their data with third parties by ensuring that the real identity of the data owner remains
Md. Ahsan Habib+1 more
wiley +1 more source
Perfect secrecy cryptosystem with nonuniform distribution of keys
More strictly mathematical concepts of infinite perfect secrecy and random “one-time pad” cryptosystem in theory were presented,and the whole secure communication system was divided into two stages:design of a basic cryptosystem and one of its ...
Chuanjun TIAN
doaj +2 more sources
The El-Gamal AA_β Public Key Cryptosystem - A new approach utilizing the subset sum problem in designing an asymmetric cryptosystem [PDF]
The El-Gamal AA_{\beta} Public Key Cryptosystem is a new asymmetric cryptosystem based on the piecewise AA_{\beta}-function. The AA_{\beta}-function which is essentially a one way Boolean function was motivated by the squaring and multiplying process while computing g^a (mod p) in the Diffie Hellman key exchange procedure and also computing C \equiv M ...
arxiv
CIDER: Cyber‐Security in Industrial IoT Using Deep Learning and Ring Learning with Errors
This paper proposes secure measures using deep machine learning‐based intrusion detection and advanced encryption schemes based on lattice‐based cryptography on the cloud‐edge‐fog IIoT architecture. The evaluation experiments performed on the Ton_IoT dataset show that the deep learning models have a very good accuracy of around 92% for attack ...
Siu Ting Tsoi, Anish Jindal
wiley +1 more source
In this paper, the security of the cryptosystem based on phase-truncation Fourier transform (PTFT) and Gerchberg-Saxton (G-S) algorithm is analyzed. In this cryptosystem, the phase key generated using phase-truncated (PT) operation is bonded with the ...
Yi Xiong, Ravi Kumar, Chenggen Quan
doaj +1 more source
Niederreiter cryptosystems using quasi-cyclic codes that resist quantum Fourier sampling [PDF]
McEliece and Niederreiter cryptosystems are robust and versatile cryptosystems. These cryptosystems work with many linear error-correcting codes. They are popular these days because they can be quantum-secure. In this paper, we study the Niederreiter cryptosystem using non-binary quasi-cyclic codes. We prove, if these quasi-cyclic codes satisfy certain
arxiv
Optimal H‐infinity fuzzy control of chaotic synchronization cryptosystems: An NN‐based approach
This study is concerned with fuzzy control for the optimal H∞ exponential synchronization of multiple time‐delay chaotic systems via the neural network‐based approach. This study combines the ElGamal encryption algorithm and chaotic synchronization to enhance security using double encryption techniques.
Feng‐Hsiag Hsiao
wiley +1 more source
NTRU-type fully homomorphic encryption scheme without key switching
In order to construct a fully homomorphic encryption scheme based on NTRU cryptosystem from ring learning with errors, noise growth and homomorphic property in the NTRU cryptosystem were analyzed. The con-cept of zero homomorphic encryption was introdced
Xin-xia SONG+2 more
doaj +3 more sources
Cryptosystem Based on Induced Group Codes
The code C on a group G, induced by the code N on a subgroup H, has the property that for decoding the code C one can use the decoder for the code N.
V. M. Deundyak, Y. V. Kosolapov
doaj +1 more source