Results 41 to 50 of about 478,748 (354)

Privacy-Preserving Collective Learning With Homomorphic Encryption

open access: yesIEEE Access, 2021
Deep learning models such as long short-term memory (LSTM) are valuable classifiers for time series data like hourly clinical statistics. However, access to health data is challenging due to privacy and legal issues.
Jestine Paul   +5 more
doaj   +1 more source

Digital Key Distribution Protected by Recorded Quantum Noise

open access: yesIEEE Access
A new digital key distribution and encryption system for broad use is presented. It offers affordable perfect security for in-transit digital communications and is quantum-resistant.
Geraldo A. A
doaj   +1 more source

Towards Secure and Efficient "white-box" Encryption [PDF]

open access: yesJournal of Universal Computer Science, 2019
In many applications implemented in mistrusted environments all operations with the secret key during an encryption operation are "obfuscated" in a way that while an attacker has access to all routines of operations, it will nevertheless be ...
Gurgen Khachatrian, Sergey Abrahamyan
doaj   +3 more sources

Cryptanalysis of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables [PDF]

open access: yes, 2007
This paper studies the security of a recently-proposed MPEG-video encryption scheme based on secret Huffman tables. Our cryptanalysis shows that: 1) the key space of the encryption scheme is not sufficiently large against divide-and-conquer (DAC) attack ...
A. Uhl   +10 more
core   +3 more sources

Metasurface-based key for computational imaging encryption

open access: yesScience Advances, 2021
A single metasurface operates as a reusable generator of different keys to encode various secret images in a computational way. Optical metasurfaces can offer high-quality multichannel displays by modulating different degrees of freedom of light ...
Peixia Zheng   +7 more
semanticscholar   +1 more source

On the Optimality of Quantum Encryption Schemes

open access: yes, 2005
It is well known that n bits of entropy are necessary and sufficient to perfectly encrypt n bits (one-time pad). Even if we allow the encryption to be approximate, the amount of entropy needed doesn't asymptotically change.
Daniel Nagaj   +2 more
core   +1 more source

On the Design of Perceptual MPEG-Video Encryption Algorithms [PDF]

open access: yes, 2006
In this paper, some existing perceptual encryption algorithms of MPEG videos are reviewed and some problems, especially security defects of two recently proposed MPEG-video perceptual encryption schemes, are pointed out.
Bhargava, Bharat   +4 more
core   +6 more sources

Attribute‐based encryption implies identity‐based encryption [PDF]

open access: yesIET Information Security, 2017
In this study, the author formally proves that designing attribute‐based encryption schemes cannot be easier than designing identity‐based encryption schemes. In more detail, they show how an attribute‐based encryption scheme which admits, at least, and policies can be combined with a ...
openaire   +3 more sources

Serial encryption using the functions of real variable

open access: yesРадіоелектронні і комп'ютерні системи, 2021
Context. Using the functions of a real variable in cryptosystems as keys allow increasing their cryptographic strength since it is more difficult to select such keys. Therefore, the development of such systems is relevant. Objective.
Viktor Avramenko, Volodymyr Demianenko
doaj   +1 more source

Uncloneable encryption

open access: yesQuantum Information and Computation, 2003
Quantum states cannot be cloned. I show how to extend this property to classical messages encoded using quantum states, a task I call ``uncloneable encryption.'' An uncloneable encryption scheme has the property that an eavesdropper Eve not only cannot read the encrypted message, but she cannot copy it down for later decoding.
openaire   +2 more sources

Home - About - Disclaimer - Privacy