Results 11 to 20 of about 459,845 (362)

A Survey on Homomorphic Encryption Schemes [PDF]

open access: yesACM Computing Surveys, 2017
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Abbas Acar   +3 more
semanticscholar   +3 more sources

Probabilistic Encryption

open access: yesJournal of Computer and System Sciences, 1984
A new probabilistic model of data encryption is introduced. For this model, under suitable complexity assumptions, it is proved that extracting any information about the cleartext from the cyphertext is hard on the average for an adversary with polynomially bounded computational resources.
S. Goldwasser, S. Micali
semanticscholar   +3 more sources

Sound Computational Interpretation of Formal Encryption with Composed Keys [PDF]

open access: yes, 2003
The formal and computational views of cryptography have been related by the seminal work of Abadi and Rogaway. In their work, a formal treatment of encryption that uses atomic keys is justified in the computational world.
Corin, R.J., Corin, R.J., Laud, P.
core   +18 more sources

Robust Encryption [PDF]

open access: yesJournal of Cryptology, 2010
We provide a provable-security treatment of "robust" encryption. Robustness means it is hard to produce a ciphertext that is valid for two different users. Robustness makes explicit a property that has been implicitly assumed in the past. We argue that it is an essential conjunct of anonymous encryption.
Abdalla, Michel   +2 more
openaire   +4 more sources

Database Encryption

open access: yes, 2023
International ...
Anciaux, Nicolas   +2 more
openaire   +3 more sources

Implementation of super H-antimagic total graph on establishing stream cipher

open access: yesIndonesian Journal of Combinatorics, 2019
This paper is aimed to study the use of super (a, d)-H antimagic total graph on generating encryption keys that can be used to establish a stream cipher. Methodology to achieve this goal was undertaken in three steps. First of all the existence of super (
Antonius Cahya Prihandoko   +2 more
doaj   +1 more source

Survey on Fully Homomorphic Encryption, Theory, and Applications

open access: yesProceedings of the IEEE, 2022
Data privacy concerns are increasing significantly in the context of the Internet of Things, cloud services, edge computing, artificial intelligence applications, and other applications enabled by next-generation networks.
Chiara Marcolla   +5 more
semanticscholar   +1 more source

Database Encryption [PDF]

open access: yes, 2011
Database encryption refers to the use of encryption techniques to transform a plain text database into a (partially) encrypted database, thus making it unreadable to anyone except those who possess the knowledge of the encryption key(s).
Bouganim, Luc, Guo, Yanli
openaire   +3 more sources

Healthchain: A Privacy Protection System for Medical Data Based on Blockchain

open access: yesFuture Internet, 2021
Recently, with the great development of e-health, more and more countries have made certain achievements in the field of electronic medical treatment. The digitization of medical equipment and the structuralization of electronic medical records are the ...
Baocheng Wang, Zetao Li
doaj   +1 more source

Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains

open access: yesInternational Journal of Information Security, 2022
Chaos-based cryptosystems have been an active area of research in recent years. Although these algorithms are not standardized like AES, DES, RSA, etc., chaos-based cryptosystems like Chebyshev polynomials can provide additional security when used with ...
Unsub Zia   +6 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy