Results 1 to 10 of about 1,838 (257)

CCA-Secure Deterministic Identity-Based Encryption Scheme [PDF]

open access: greenJournal of Universal Computer Science, 2019
Deterministic public-key encryption, encrypting a plaintext into a unique ciphertext without involving any randomness, was introduced by Bellare, Boldyreva, and O'Neill (CRYPTO 2007) as a realistic alternative to some inherent drawbacks in randomized ...
Meijuan Huang   +5 more
doaj   +7 more sources

Deterministic Authenticated Encryption Scheme for Memory Constrained Devices [PDF]

open access: goldCryptography, 2018
A technique of authenticated encryption for memory constrained devices called sp-AELM was proposed by Agrawal et al. at ACISP 2015. The sp-ALEM construction utilizes a sponge-based primitive to support online encryption and decryption functionalities ...
Megha Agrawal   +2 more
doaj   +4 more sources

LM-DAE: Low-Memory Deterministic Authenticated Encryption for 128-bit Security

open access: diamondIACR Transactions on Symmetric Cryptology, 2020
This paper proposes a new lightweight deterministic authenticated encryption (DAE) scheme providing 128-bit security. Lightweight DAE schemes are practically important because resource-restricted devices sometimes cannot afford to manage a nonce properly.
Yusuke Naito   +2 more
doaj   +5 more sources

Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data

open access: greenIACR Transactions on Symmetric Cryptology, 2018
Statistical analysis of ciphertexts has been recently used to carry out devastating inference attacks on deterministic encryption (Naveed, Kamara, and Wright, CCS 2015), order-preserving/revealing encryption (Grubbs et al., S&P 2017), and searchable ...
Marie-Sarah Lacharité   +1 more
doaj   +6 more sources

SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things

open access: greenIACR Transactions on Symmetric Cryptology, 2018
Lightweight cryptography was developed in response to the increasing need to secure devices for the Internet of Things. After significant research effort, many new block ciphers have been designed targeting lightweight settings, optimizing efficiency ...
Subhadeep Banik   +3 more
doaj   +6 more sources

Algebraic Cryptanalysis of Deterministic Symmetric Encryption [PDF]

open access: gold, 2015
Deterministic symmetric encryption is widely used in many cryptographic applications. The security of deterministic block and stream ciphers is evaluated using cryptanalysis. Cryptanalysis is divided into two main categories: statistical cryptanalysis and algebraic cryptanalysis.
Petr Sušil
openalex   +3 more sources

Practical CCA-Secure Functional Encryptions for Deterministic Functions [PDF]

open access: hybridSecurity and Communication Networks, 2020
Functional encryption (FE) can implement fine-grained control to encrypted plaintext via permitting users to compute only some specified functions on the encrypted plaintext using private keys with respect to those functions. Recently, many FEs were put forward; nonetheless, most of them cannot resist chosen-ciphertext attacks (CCAs), especially for ...
Huige Wang   +3 more
openalex   +2 more sources

Encryption using Deterministic Chaos.

open access: green, 2010
The concepts of randomness, unpredictability, complexity and entropy form the basis of modern cryptography and a cryptosystem can be interpreted as the design of a key-dependent bijective transformation that is unpredictable to an observer for a given computational resource.
Jonathan Blackledge
openalex   +4 more sources

Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes [PDF]

open access: goldIEEE Access, 2019
We study how to make any deterministic encryption scheme probabilistic and secure against adaptively chosen ciphertext attacks. A new transpositional padding encryption scheme is proposed, with which we construct a universal scheme, namely, a ...
Linming Gong   +4 more
doaj   +2 more sources

Towards Tightly Secure Deterministic Public Key Encryption [PDF]

open access: closedInformation Processing Letters, 2018
This paper presents three curious findings about deterministic public-key encryption (D-PKE) that further our understanding of its security, in particular because of the contrast with standard, randomized public-key encryption (R-PKE): It would appear to be a triviality, for any primitive, that security in the standard model implies security in ...
Daode Zhang   +5 more
  +4 more sources

Home - About - Disclaimer - Privacy