Results 231 to 240 of about 493,090 (289)

Federated Learning for a Dynamic Edge: A Modular and Resilient Approach. [PDF]

open access: yesSensors (Basel)
Almeida L   +4 more
europepmc   +1 more source

Quantum secured blockchain framework for enhancing post quantum data security. [PDF]

open access: yesSci Rep
Reddy NR   +5 more
europepmc   +1 more source

Randomized pseudo-probabilistic encryption algorithms

2017 XX IEEE International Conference on Soft Computing and Measurements (SCM), 2017
The aim of the paper is providing resistance of the deniable encryption protocols to coercive attacks at which coercer has possibility to cause repeated encryption of the same input messages and/or to estimate the duration of the decryption procedure performed for disclosing the secret message.
P. I. Shapovalov   +3 more
openaire   +3 more sources

Universal quantum circuit evaluation on encrypted data using probabilistic quantum homomorphic encryption scheme*

Chinese Physics B, 2021
Homomorphic encryption has giant advantages in the protection of privacy information. In this paper, we present a new kind of probabilistic quantum homomorphic encryption scheme for the universal quantum circuit evaluation. Firstly, the pre-shared non-maximally entangled states are utilized as auxiliary resources, which lower the requirements of the ...
Jing-Wen Zhang   +3 more
openaire   +3 more sources

A knapsack-based probabilistic encryption scheme

open access: closedInformation Sciences, 2007
Knapsack-based cryptosystems had been viewed as the most attractive and the most promising asymmetric cryptographic algorithms for a long time due to their NP-completeness nature and high speed in encryption/decryption. Unfortunately, most of them are broken for the low-density feature of the underlying knapsack problems.
Baocang Wang, Qianhong Wu, Yupu Hu
openalex   +3 more sources

The Probabilistic Encryption Algorithm Using Linear Transformation

2015
The probabilistic encryption produces more than one ciphertext for the same plaintext. In this paper an attempt has been made to propose a probabilistic encryption algorithm based on simple linear transformation. The variable length sub key groups are generated using a random sequence.
K. Adi Narayana Reddy, B. Vishnuvardhan
openaire   +3 more sources

Home - About - Disclaimer - Privacy