Results 231 to 240 of about 1,838 (257)

Dynamic Encryption Based on Deterministic Chaos

open access: closed2024 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM)
Tatiana D. Kainova
openalex   +2 more sources

Deterministic Encryption with the Thorp Shuffle

Journal of Cryptology, 2017
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Morris, Ben   +2 more
openaire   +2 more sources

Quantifying Information Leakage of Deterministic Encryption

Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019
In order to protect user data while maintaining application functionality, encrypted databases can use specialized cryptography such as property-revealing encryption, which allows a property of the underlying plaintext values to be computed from the ciphertext.
Mireya Jurado, Geoffrey Smith
openaire   +1 more source

Big Data Privacy Using Fully Homomorphic Non-Deterministic Encryption

2017 IEEE 7th International Advance Computing Conference (IACC), 2017
Big data is a large amount of digital information. Now days, data security is a challenging issue that touches several areas along with computers and communication. The security of data which stored online has become a main concern. Several attackers play with confidentiality of the user.
Tejashree B. Patil   +2 more
openaire   +1 more source

Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE

2009
We build on the new security notion for deterministic encryption (PRIV) and the PRIV-secure schemes presented by Bellare et al at Crypto'07. Our work introduces: 1) A generic and efficient construction of deterministic length-preserving hybrid encryption, which is an improvement on the scheme sketched in the above paper; to our best knowledge, this is ...
Yang Cui   +3 more
openaire   +1 more source

Information security analysis of deterministic encryption and chaotic encryption in spatial domain and frequency domain

2017 14th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE), 2017
Information security is crucial to data storage and transmission, which is necessary to protect information under various hostile environments. Cryptography serves as a major element to ensure confidentiality in both communication and information technology, where the encryption and decryption schemes are implemented to scramble the pure plaintext and ...
Zhengmao Ye, Hang Yin, Yongmao Ye
openaire   +1 more source

Deterministic phase encoding encryption in arbitrary phase-step digital holography

SPIE Proceedings, 2010
A deterministic phase-encoded encryption system, which adopts a lenticular lens array (LLA) sheet as a phase modulator (key), based on arbitrary two-step phase-shift interferometry (PSI), with an unknown phase step, is presented. The principle of encryption and decryption which is using a LLA in arbitrary unknown two-step PSI is given.
Chi-Ching Chang   +2 more
openaire   +1 more source

Privacy-Preserving Deterministic Automata Evaluation with Encrypted Data Blocks

2017
Secure computation (i.e., performing computation while keeping inputs private) is a fundamental problem in cryptography. In this paper, we present an efficient and secure 2-party computation protocol for deterministic automata evaluation, a problem of large practical relevance.
Giovanni Di Crescenzo   +2 more
openaire   +1 more source

Optical Image Encryption Process Using Triple Deterministic Spherical Phase Masks Array

2020
In this paper, we perform a study of optical image encryption using triple deterministic phase mask (TDPE) based on diffractive spherical phase masks array (SPMA). By combining the diffractive spherical phase masks array with the deterministic phase masks method we can improve the security level of an encryption scheme by increasing the key space and ...
Wiam Zamrani, Esmail Ahouzi
openaire   +1 more source

A Non-deterministic Searchable Encryption Scheme in Internet of Things Environments

Advanced Science and Technology Letters, 2015
Today, the developments of ICT move to IoT from M2M environments. In this environment, it generally use cloud storage service to store massive data. The data should be stored encrypted, because non-encrypted data may cause problems with the personal privacy. However, the encrypted data is decrypted when retrieve keyword.
Junho Jeong, Yunsik Son
openaire   +1 more source

Home - About - Disclaimer - Privacy