Metasurface-based key for computational imaging encryption
A single metasurface operates as a reusable generator of different keys to encode various secret images in a computational way. Optical metasurfaces can offer high-quality multichannel displays by modulating different degrees of freedom of light ...
Peixia Zheng+7 more
semanticscholar +1 more source
A Color Image Encryption Using Dynamic DNA and 4-D Memristive Hyper-Chaos
In this paper, a color image encryption is proposed based on the dynamic DNA and the 4-D memristive hyper-chaos. First, chaotic matrices are generated from the 4-D memristive hyper-chaos by using the plain image, the salt key, and control parameters ...
Zhentao Liu+3 more
doaj +1 more source
Algorithms for solving a class of real quasi-symmetric Toeplitz linear systems and its applications
In this paper, fast numerical methods for solving the real quasi-symmetric Toeplitz linear system are studied in two stages. First, based on an order-reduction algorithm and the factorization of Toeplitz matrix inversion, a sequence of linear systems ...
Xing Zhang+3 more
doaj +1 more source
Real-time chaotic video encryption based on multithreaded parallel confusion and diffusion [PDF]
Due to the strong correlation between adjacent pixels, most image encryption schemes perform multiple rounds of confusion and diffusion to protect the image against attacks. Such operations, however, are time-consuming, cannot meet the real-time requirements of video encryption.
arxiv +1 more source
Blind Functional Encryption [PDF]
Functional encryption (FE) gives the power to retain control of sensitive information and is particularly suitable in several practical real-world use cases. Using this primitive, anyone having a specific functional decryption key (derived from some master secret key) could only obtain the evaluation of an authorized function f over a message m, given ...
Canard, Sébastien+2 more
openaire +4 more sources
Secure and Private Implementation of Dynamic Controllers Using Semi-Homomorphic Encryption [PDF]
This paper presents a secure and private implementation of linear time-invariant dynamic controllers using Paillier's encryption, a semi-homomorphic encryption method.
Farokhi, Farhad+2 more
core +2 more sources
CLOAK: A Stream Cipher Based Encryption Protocol for Mobile Cloud Computing
Mobile device and its applications have revolutionized the way we store and share data. It is becoming a warehouse of users personal information. Unluckily, most of these data are stored in an unencrypted format, prone to security threats. In this paper,
Amit Banerjee+3 more
doaj +1 more source
Comparative evaluation of different methods of "Homomorphic Encryption" and "Traditional Encryption" on a dataset with current problems and developments [PDF]
A database is a prime target for cyber-attacks as it contains confidential, sensitive, or protected information. With the increasing sophistication of the internet and dependencies on internet data transmission, it has become vital to be aware of various encryption technologies and trends. It can assist in safeguarding private information and sensitive
arxiv
Searchable symmetric encryption: improved definitions and efficient constructions
Searchable symmetric encryption (SSE) allows a party to outsource the storage of its data to another party (a server) in a private manner, while maintaining the ability to selectively search over it.
Reza Curtmola+3 more
semanticscholar +1 more source
Cloud-based electronic health record (EHR) systems enable medical documents to be exchanged between medical institutions; this is expected to contribute to improvements in various medical services in the future.
Kwangsoo Seol+4 more
doaj +1 more source