Deterministic quantum-public-key encryption: Forward search attack and randomization [PDF]
5 pages, 1 ...
Georgios M. Nikolopoulos +1 more
openalex +3 more sources
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles [PDF]
We strengthen the foundations of deterministic public-key encryption via definitional equivalences and standard-model constructs based on general assumptions. Specifically we consider seven notions of privacy for deterministic encryption, including six forms of semantic security and an indistinguishability notion, and show them all equivalent.
Mihir Bellare +3 more
openalex +2 more sources
Optical image encryption technique based on deterministic phase masks [PDF]
The double-random phase encoding (DRPE) scheme, which is based on a 4f optical correlator system, is considered as a reference for the optical encryption field. We propose a modification of the classical DRPE scheme based on the use of a class of structured phase masks, the deterministic phase masks.
Wiam Zamrani +4 more
openalex +3 more sources
Big Data Analysis And Deterministic Encryption Challenges
Over the past decade, big data analysis has seen an exponential growth and will certainly continue to witness spectacular developments due to the emergence of new interactive multimedia applications and highly integrated systems driven by the rapid growth in information services and microelectronic devices. Up to yet, large no.
Aasim Shafi
openalex +3 more sources
Non-deterministic Image Encryption Based on Symmetric Cryptosystem
AbstractIn this paper, an encryption algorithm for images using a secret key of 128-bits is proposed. To improve the security of the encrypted image, a unique timestamp is used while encryption. Initially, the image is divided into multiple blocks and each block is encrypted separately.
B. Sri Gurubaran +3 more
openalex +2 more sources
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Zvika Brakerski, Gil Segev
openalex +5 more sources
Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Ananth Raghunathan +2 more
openalex +5 more sources
A generic construction of CCA-secure deterministic encryption [PDF]
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO 2007), is an important technique for searchable encryption; it allows quick, logarithmic-time, search over encrypted data items. The technique is most effective in scenarios where frequent search queries are performed over a huge database of unpredictable data ...
Meijuan Huang +5 more
openalex +3 more sources
Hybrid Image Encryption Technique Using Genetic Algorithm and Lorenz Chaotic System [PDF]
One of the important application of image encryption is storing confidential and important images on a local device or a database in such a way that only the authorized party can view or perceive it.
Chikkareddi Vishwanath +4 more
doaj +1 more source
Incremental Deterministic Public-Key Encryption [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Mironov, Ilya +3 more
openaire +2 more sources

