Design of Nonlinear Component of Block Cipher Using Gravesian Octonion Integers
Being the only nonlinear component in many cryptosystems, an S-box is an integral part of modern symmetric ciphering techniques that creates randomness and increases confidentiality at the substitution stage of the encryption.
Muhammad Irfan+5 more
doaj +1 more source
Real-time chaotic video encryption based on multithreaded parallel confusion and diffusion [PDF]
Due to the strong correlation between adjacent pixels, most image encryption schemes perform multiple rounds of confusion and diffusion to protect the image against attacks. Such operations, however, are time-consuming, cannot meet the real-time requirements of video encryption.
arxiv +1 more source
Secure and Private Implementation of Dynamic Controllers Using Semi-Homomorphic Encryption [PDF]
This paper presents a secure and private implementation of linear time-invariant dynamic controllers using Paillier's encryption, a semi-homomorphic encryption method.
Farokhi, Farhad+2 more
core +2 more sources
A Color Image Encryption Using Dynamic DNA and 4-D Memristive Hyper-Chaos
In this paper, a color image encryption is proposed based on the dynamic DNA and the 4-D memristive hyper-chaos. First, chaotic matrices are generated from the 4-D memristive hyper-chaos by using the plain image, the salt key, and control parameters ...
Zhentao Liu+3 more
doaj +1 more source
Comparative evaluation of different methods of "Homomorphic Encryption" and "Traditional Encryption" on a dataset with current problems and developments [PDF]
A database is a prime target for cyber-attacks as it contains confidential, sensitive, or protected information. With the increasing sophistication of the internet and dependencies on internet data transmission, it has become vital to be aware of various encryption technologies and trends. It can assist in safeguarding private information and sensitive
arxiv
Blind Functional Encryption [PDF]
Functional encryption (FE) gives the power to retain control of sensitive information and is particularly suitable in several practical real-world use cases. Using this primitive, anyone having a specific functional decryption key (derived from some master secret key) could only obtain the evaluation of an authorized function f over a message m, given ...
Canard, Sébastien+2 more
openaire +4 more sources
A Practical Public Key Encryption Scheme Based on Learning Parity With Noise
To protect cyber security and privacy, it is critical to design security and practical public key encryption schemes. Today, big data and cloud computing bring not only unprecedented opportunities but also fundamental security challenges.
Zhimin Yu+4 more
doaj +1 more source
The increasing security threat is a serious challenge to the internet of things (IoT). Hardware‐based security primitive is an essential and powerful way to protect IoT devices from various attacks. But most of the current security hardwares are based on
Qian Li+7 more
doaj +1 more source
Quantum fully homomorphic encryption scheme based on universal quantum circuit [PDF]
Fully homomorphic encryption enables arbitrary computation on encrypted data without decrypting the data. Here it is studied in the context of quantum information processing. Based on universal quantum circuit, we present a quantum fully homomorphic encryption (QFHE) scheme, which permits arbitrary quantum transformation on an encrypted data.
arxiv +1 more source
Owner Specified Excessive Access Control for Attribute Based Encryption
Attribute-based encryption (ABE) has emerged as a promising solution for access control to diverse set of users in cloud computing systems. Policy can just specify whether (or not) any specific user should be given access to data, but it lacks to provide
Fawad Khan, Hui Li, Liangxuan Zhang
doaj +1 more source