Results 11 to 20 of about 459,845 (362)
A Survey on Homomorphic Encryption Schemes [PDF]
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Abbas Acar +3 more
semanticscholar +3 more sources
A new probabilistic model of data encryption is introduced. For this model, under suitable complexity assumptions, it is proved that extracting any information about the cleartext from the cyphertext is hard on the average for an adversary with polynomially bounded computational resources.
S. Goldwasser, S. Micali
semanticscholar +3 more sources
Sound Computational Interpretation of Formal Encryption with Composed Keys [PDF]
The formal and computational views of cryptography have been related by the seminal work of Abadi and Rogaway. In their work, a formal treatment of encryption that uses atomic keys is justified in the computational world.
Corin, R.J., Corin, R.J., Laud, P.
core +18 more sources
We provide a provable-security treatment of "robust" encryption. Robustness means it is hard to produce a ciphertext that is valid for two different users. Robustness makes explicit a property that has been implicitly assumed in the past. We argue that it is an essential conjunct of anonymous encryption.
Abdalla, Michel +2 more
openaire +4 more sources
Implementation of super H-antimagic total graph on establishing stream cipher
This paper is aimed to study the use of super (a, d)-H antimagic total graph on generating encryption keys that can be used to establish a stream cipher. Methodology to achieve this goal was undertaken in three steps. First of all the existence of super (
Antonius Cahya Prihandoko +2 more
doaj +1 more source
Survey on Fully Homomorphic Encryption, Theory, and Applications
Data privacy concerns are increasing significantly in the context of the Internet of Things, cloud services, edge computing, artificial intelligence applications, and other applications enabled by next-generation networks.
Chiara Marcolla +5 more
semanticscholar +1 more source
Database encryption refers to the use of encryption techniques to transform a plain text database into a (partially) encrypted database, thus making it unreadable to anyone except those who possess the knowledge of the encryption key(s).
Bouganim, Luc, Guo, Yanli
openaire +3 more sources
Healthchain: A Privacy Protection System for Medical Data Based on Blockchain
Recently, with the great development of e-health, more and more countries have made certain achievements in the field of electronic medical treatment. The digitization of medical equipment and the structuralization of electronic medical records are the ...
Baocheng Wang, Zetao Li
doaj +1 more source
Chaos-based cryptosystems have been an active area of research in recent years. Although these algorithms are not standardized like AES, DES, RSA, etc., chaos-based cryptosystems like Chebyshev polynomials can provide additional security when used with ...
Unsub Zia +6 more
semanticscholar +1 more source

