Results 11 to 20 of about 404,295 (388)
A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare [PDF]
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee).
Hartel, Pieter+3 more
core +26 more sources
The development of advanced materials for information encryption with time-dependent features is essential to meet the increasing demand on encryption security.
Qianqian Wang+5 more
semanticscholar +1 more source
Database encryption refers to the use of encryption techniques to transform a plain text database into a (partially) encrypted database, thus making it unreadable to anyone except those who possess the knowledge of the encryption key(s).
Bouganim, Luc, Guo, Yanli
openaire +4 more sources
Ascon v1.2: Lightweight Authenticated Encryption and Hashing
Authenticated encryption satisfies the basic need for authenticity and confidentiality in our information infrastructure. In this paper, we provide the specification of Ascon-128 and Ascon-128a.
Christoph Dobraunig+3 more
semanticscholar +1 more source
A Review of Secure and Privacy-Preserving Medical Data Sharing
In the digital healthcare era, it is of the utmost importance to harness medical information scattered across healthcare institutions to support in-depth data analysis and achieve personalized healthcare.
Hao Jin+3 more
doaj +1 more source
Ciphertext-Policy Attribute-Based Encryption
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such policies is to employ a trusted server to store the data and mediate ...
J. Bethencourt, A. Sahai, Brent Waters
semanticscholar +1 more source
Fully homomorphic encryption using ideal lattices
We propose a fully homomorphic encryption scheme -- i.e., a scheme that allows one to evaluate circuits over encrypted data without being able to decrypt. Our solution comes in three steps.
Craig Gentry
semanticscholar +1 more source
Chaos-based cryptosystems have been an active area of research in recent years. Although these algorithms are not standardized like AES, DES, RSA, etc., chaos-based cryptosystems like Chebyshev polynomials can provide additional security when used with ...
Unsub Zia+6 more
semanticscholar +1 more source
Owner Specified Excessive Access Control for Attribute Based Encryption
Attribute-based encryption (ABE) has emerged as a promising solution for access control to diverse set of users in cloud computing systems. Policy can just specify whether (or not) any specific user should be given access to data, but it lacks to provide
Fawad Khan, Hui Li, Liangxuan Zhang
doaj +1 more source
Similarity Calculation Based on Homomorphic Encryption [PDF]
In recent years, although some homomorphic encryption algorithms have been proposed to provide additive homomorphic encryption and multiplicative homomorphic encryption. However, similarity measures are required for searches and queries under homomorphic encrypted ciphertexts.
arxiv +1 more source