A Symmetric Searchable Encryption Identification of Data on Probabilistic Trapdoors [PDF]
Accessible Encryption (SE) permits a client in accordance with transfer records in accordance with the astronaut and according to seem thru it of a faraway manner while defending the security concerning each the statistics yet the inquiries. Right now, entrust a generative then the simple in imitation of actualize Symmetric Searchable Encryption Scheme
N. V. V. Satyanarayana +4 more
openalex +2 more sources
Benaloh’s Dense Probabilistic Encryption Revisited [PDF]
In 1994, Josh Benaloh proposed a probabilistic homomorphic encryption scheme, enhancing the poor expansion factor provided by Goldwasser and Micali's scheme. Since then, numerous papers have taken advantage of Benaloh's homomorphic encryption function, including voting schemes, computing multi-party trust privately, non-interactive verifiable secret ...
Laurent Fousse +2 more
openalex +5 more sources
PROBLEMS WITH A PROBABILISTIC ENCRYPTION SCHEME BASED ON CHAOTIC SYSTEMS [PDF]
Recently S. Papadimitriou et al. have proposed a new probabilistic encryption scheme based on chaotic systems. In this letter, we point out some problems with Papadimitriou et al.'s chaotic cryptosystem: (1) the size of the ciphertext and the plaintext cannot simultaneously ensure practical implementation and high security; (2) the estimated number of
Shujun Li +4 more
openalex +6 more sources
EncCluster: Scalable functional encryption in federated learning through weight clustering and probabilistic filters [PDF]
Federated Learning (FL) enables model training across decentralized devices by communicating solely local model updates to an aggregation server. Although such limited data sharing makes FL more secure than centralized approached, FL remains vulnerable ...
Vasileios Tsouvalas +5 more
semanticscholar +3 more sources
Characterization of Security Notions for Probabilistic Private-Key Encryption [PDF]
The development of precise definitions of security for encryption, as well as a detailed understanding of their relationships, has been a major area of research in modern cryptography. Here, we focus on the case of private-key encryption.
Jonathan Katz, Moti Yung
openalex +4 more sources
Probabilistic shaping based constellation encryption for physical layer security in OFDM RoF system
The physical layer security of radio-over-fiber (RoF) system is a very important problem for future communication. In this paper, a novel probabilistic shaping (PS) based constellation encryption scheme is proposed in which two bit-level encryption ...
Zhiyi Wang +8 more
openalex +2 more sources
Quantum probabilistic encryption scheme based on conjugate coding [PDF]
We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryption protocols. Here we consider the way it increases the unicity distance of both classical and quantum private-key encryption schemes ...
Li Yang, Chong Xiang, Bao Li
+7 more sources
Explicit Randomness is not Necessary when Modeling Probabilistic Encryption
Although good encryption functions are probabilistic, most symbolic models do not capture this aspect explicitly. A typical solution, recently used to prove the soundness of such models with respect to computational ones, is to explicitly represent the dependency of ciphertexts on random coins as labels. In order to make these label-based models useful,
Véronique Cortier +2 more
openalex +6 more sources
A Symmetric, Probabilistic, Non-Circuit Based Fully Homomorphic Encryption Scheme
– Traditional encryption allows encrypted data to be decrypted before any computation could be performed on such data. This approach could compromise the security of the data when an untrusted party is involved in the computation.
George Asante +3 more
openalex +2 more sources
Comparative Study of RSA and Probabilistic Encryption/Decryption Algorithms [PDF]
N Priya
semanticscholar +3 more sources

