Results 41 to 50 of about 478,748 (354)
Privacy-Preserving Collective Learning With Homomorphic Encryption
Deep learning models such as long short-term memory (LSTM) are valuable classifiers for time series data like hourly clinical statistics. However, access to health data is challenging due to privacy and legal issues.
Jestine Paul +5 more
doaj +1 more source
Digital Key Distribution Protected by Recorded Quantum Noise
A new digital key distribution and encryption system for broad use is presented. It offers affordable perfect security for in-transit digital communications and is quantum-resistant.
Geraldo A. A
doaj +1 more source
Towards Secure and Efficient "white-box" Encryption [PDF]
In many applications implemented in mistrusted environments all operations with the secret key during an encryption operation are "obfuscated" in a way that while an attacker has access to all routines of operations, it will nevertheless be ...
Gurgen Khachatrian, Sergey Abrahamyan
doaj +3 more sources
Cryptanalysis of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables [PDF]
This paper studies the security of a recently-proposed MPEG-video encryption scheme based on secret Huffman tables. Our cryptanalysis shows that: 1) the key space of the encryption scheme is not sufficiently large against divide-and-conquer (DAC) attack ...
A. Uhl +10 more
core +3 more sources
Metasurface-based key for computational imaging encryption
A single metasurface operates as a reusable generator of different keys to encode various secret images in a computational way. Optical metasurfaces can offer high-quality multichannel displays by modulating different degrees of freedom of light ...
Peixia Zheng +7 more
semanticscholar +1 more source
On the Optimality of Quantum Encryption Schemes
It is well known that n bits of entropy are necessary and sufficient to perfectly encrypt n bits (one-time pad). Even if we allow the encryption to be approximate, the amount of entropy needed doesn't asymptotically change.
Daniel Nagaj +2 more
core +1 more source
On the Design of Perceptual MPEG-Video Encryption Algorithms [PDF]
In this paper, some existing perceptual encryption algorithms of MPEG videos are reviewed and some problems, especially security defects of two recently proposed MPEG-video perceptual encryption schemes, are pointed out.
Bhargava, Bharat +4 more
core +6 more sources
Attribute‐based encryption implies identity‐based encryption [PDF]
In this study, the author formally proves that designing attribute‐based encryption schemes cannot be easier than designing identity‐based encryption schemes. In more detail, they show how an attribute‐based encryption scheme which admits, at least, and policies can be combined with a ...
openaire +3 more sources
Serial encryption using the functions of real variable
Context. Using the functions of a real variable in cryptosystems as keys allow increasing their cryptographic strength since it is more difficult to select such keys. Therefore, the development of such systems is relevant. Objective.
Viktor Avramenko, Volodymyr Demianenko
doaj +1 more source
Quantum states cannot be cloned. I show how to extend this property to classical messages encoded using quantum states, a task I call ``uncloneable encryption.'' An uncloneable encryption scheme has the property that an eavesdropper Eve not only cannot read the encrypted message, but she cannot copy it down for later decoding.
openaire +2 more sources

