Results 11 to 20 of about 505,863 (290)

Benaloh’s Dense Probabilistic Encryption Revisited [PDF]

open access: green, 2011
In 1994, Josh Benaloh proposed a probabilistic homomorphic encryption scheme, enhancing the poor expansion factor provided by Goldwasser and Micali's scheme. Since then, numerous papers have taken advantage of Benaloh's homomorphic encryption function, including voting schemes, computing multi-party trust privately, non-interactive verifiable secret ...
Laurent Fousse   +2 more
openalex   +4 more sources

EncCluster: Scalable Functional Encryption in Federated Learning through Weight Clustering and Probabilistic Filters [PDF]

open access: greenPervasive and Mobile Computing
Federated Learning (FL) enables model training across decentralized devices by communicating solely local model updates to an aggregation server. Although such limited data sharing makes FL more secure than centralized approached, FL remains vulnerable ...
Vasileios Tsouvalas   +5 more
semanticscholar   +3 more sources

Three-dimensional dynamic probabilistic shaping high-security transmission scheme based on dual physical layer encryption for seven-core fibers [PDF]

open access: bronzeChinese Optics Letters (COL)
In this ...
Yaya Mao   +9 more
openalex   +2 more sources

Probabilistic shaping based constellation encryption for physical layer security in OFDM RoF system

open access: goldOptics Express, 2021
The physical layer security of radio-over-fiber (RoF) system is a very important problem for future communication. In this paper, a novel probabilistic shaping (PS) based constellation encryption scheme is proposed in which two bit-level encryption ...
Zhiyi Wang   +8 more
openalex   +2 more sources

A Symmetric, Probabilistic, Non-Circuit Based Fully Homomorphic Encryption Scheme

open access: diamondInternational Journal of Computer Networks And Applications, 2022
– Traditional encryption allows encrypted data to be decrypted before any computation could be performed on such data. This approach could compromise the security of the data when an untrusted party is involved in the computation.
George Asante   +3 more
openalex   +2 more sources

Quantum probabilistic encryption scheme based on conjugate coding [PDF]

open access: greenChina Communications, 2012
We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryption protocols. Here we consider the way it increases the unicity distance of both classical and quantum private-key encryption schemes ...
Yang Li, Chong Xiang, Bao Li
openalex   +4 more sources

Probabilistic Selective Encryption of Convolutional Neural Networks for Hierarchical Services [PDF]

open access: greenComputer Vision and Pattern Recognition, 2021
Model protection is vital when deploying Convolutional Neural Networks (CNNs) for commercial services, due to the massive costs of training them. In this work, we propose a selective encryption (SE) algorithm to protect CNN models from unauthorized ...
Jinyu Tian, Jiantao Zhou, Jia Duan
openalex   +3 more sources

Semantic Entanglement-Based Ransomware Detection via Probabilistic Latent Encryption Mapping [PDF]

open access: greenarXiv.org
Encryption-based attacks have introduced significant challenges for detection mechanisms that rely on predefined signatures, heuristic indicators, or static rule-based classifications.
Mohamed Eisa   +4 more
openalex   +2 more sources

A New Probabilistic Encryption Scheme [PDF]

open access: bronze, 2007
In this paper we present a new probabilistic public key cryptosystem. The system is polynomially secure. Furthermore, it is highly efficient in that it's message expansion is l+(k-1)/1, where k is the security parameter and l the length of the encrypted message. Finally, the system can be used to sign signatures.
Jingmin He, Lu Kai-cheng
openalex   +2 more sources

An Introduction to Probabilistic Encryption

open access: greenOsječki matematički list, 2006
An introduction to probabilistic encryption is given, presenting the first probabilistic cryptosystem by Goldwasser and Micali. Furthermore, the required number-theoretic concepts are discussed and the notion of semantic security is presented in an informal way. The article should be comprehensible to students with basic mathematical knowledge.
Georg Fuchsbauer
openalex   +4 more sources

Home - About - Disclaimer - Privacy