Benaloh’s Dense Probabilistic Encryption Revisited [PDF]
In 1994, Josh Benaloh proposed a probabilistic homomorphic encryption scheme, enhancing the poor expansion factor provided by Goldwasser and Micali's scheme. Since then, numerous papers have taken advantage of Benaloh's homomorphic encryption function, including voting schemes, computing multi-party trust privately, non-interactive verifiable secret ...
Laurent Fousse +2 more
openalex +4 more sources
EncCluster: Scalable Functional Encryption in Federated Learning through Weight Clustering and Probabilistic Filters [PDF]
Federated Learning (FL) enables model training across decentralized devices by communicating solely local model updates to an aggregation server. Although such limited data sharing makes FL more secure than centralized approached, FL remains vulnerable ...
Vasileios Tsouvalas +5 more
semanticscholar +3 more sources
Three-dimensional dynamic probabilistic shaping high-security transmission scheme based on dual physical layer encryption for seven-core fibers [PDF]
In this ...
Yaya Mao +9 more
openalex +2 more sources
Probabilistic shaping based constellation encryption for physical layer security in OFDM RoF system
The physical layer security of radio-over-fiber (RoF) system is a very important problem for future communication. In this paper, a novel probabilistic shaping (PS) based constellation encryption scheme is proposed in which two bit-level encryption ...
Zhiyi Wang +8 more
openalex +2 more sources
A Symmetric, Probabilistic, Non-Circuit Based Fully Homomorphic Encryption Scheme
– Traditional encryption allows encrypted data to be decrypted before any computation could be performed on such data. This approach could compromise the security of the data when an untrusted party is involved in the computation.
George Asante +3 more
openalex +2 more sources
Quantum probabilistic encryption scheme based on conjugate coding [PDF]
We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryption protocols. Here we consider the way it increases the unicity distance of both classical and quantum private-key encryption schemes ...
Yang Li, Chong Xiang, Bao Li
openalex +4 more sources
Probabilistic Selective Encryption of Convolutional Neural Networks for Hierarchical Services [PDF]
Model protection is vital when deploying Convolutional Neural Networks (CNNs) for commercial services, due to the massive costs of training them. In this work, we propose a selective encryption (SE) algorithm to protect CNN models from unauthorized ...
Jinyu Tian, Jiantao Zhou, Jia Duan
openalex +3 more sources
Semantic Entanglement-Based Ransomware Detection via Probabilistic Latent Encryption Mapping [PDF]
Encryption-based attacks have introduced significant challenges for detection mechanisms that rely on predefined signatures, heuristic indicators, or static rule-based classifications.
Mohamed Eisa +4 more
openalex +2 more sources
A New Probabilistic Encryption Scheme [PDF]
In this paper we present a new probabilistic public key cryptosystem. The system is polynomially secure. Furthermore, it is highly efficient in that it's message expansion is l+(k-1)/1, where k is the security parameter and l the length of the encrypted message. Finally, the system can be used to sign signatures.
Jingmin He, Lu Kai-cheng
openalex +2 more sources
An Introduction to Probabilistic Encryption
An introduction to probabilistic encryption is given, presenting the first probabilistic cryptosystem by Goldwasser and Micali. Furthermore, the required number-theoretic concepts are discussed and the notion of semantic security is presented in an informal way. The article should be comprehensible to students with basic mathematical knowledge.
Georg Fuchsbauer
openalex +4 more sources

