Results 241 to 250 of about 505,863 (290)
Secure and Efficient Lattice-Based Ring Signcryption Scheme for BCCL. [PDF]
Zhang Y, Duan P, Li C, Ahmad H, Zhang H.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Chinese Physics B, 2021
Homomorphic encryption has giant advantages in the protection of privacy information. In this paper, we present a new kind of probabilistic quantum homomorphic encryption scheme for the universal quantum circuit evaluation. Firstly, the pre-shared non-maximally entangled states are utilized as auxiliary resources, which lower the requirements of the ...
Jing-Wen Zhang +3 more
openaire +2 more sources
Homomorphic encryption has giant advantages in the protection of privacy information. In this paper, we present a new kind of probabilistic quantum homomorphic encryption scheme for the universal quantum circuit evaluation. Firstly, the pre-shared non-maximally entangled states are utilized as auxiliary resources, which lower the requirements of the ...
Jing-Wen Zhang +3 more
openaire +2 more sources
Coordinated-security based on probabilistic shaping and encryption in MMW-RoF system
A coordinated-security probabilistic shaping (PS) physical layer encryption scheme is proposed for a W-band millimeter-wave radio-over-fiber (MMW-RoF) system.
Yaoqiang Xiao +4 more
openalex +2 more sources
Bit-Oriented Quantum Public Key Probabilistic Encryption Schemes
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Shihui Zheng, Lize Gu, Xiao Da
openalex +2 more sources
The Probabilistic Encryption Algorithm Using Linear Transformation
2015The probabilistic encryption produces more than one ciphertext for the same plaintext. In this paper an attempt has been made to propose a probabilistic encryption algorithm based on simple linear transformation. The variable length sub key groups are generated using a random sequence.
K. Adi Narayana Reddy, B. Vishnuvardhan
openaire +2 more sources
A multipermutation superposition coding-based fragile watermarking for probabilistic encryption
Multimedia Tools and Applications, 2022Li Jiang +3 more
openaire +2 more sources
A Probabilistic Public-Key Encryption with Ensuring Data Integrity in Cloud Computing
2023 International Conference on Control, Artificial Intelligence, Robotics & Optimization (ICCAIRO), 2023Researchers are working hard to face various challenges in the fast-moving field of network security and data exchange. When it comes to encryption techniques, efforts vary to address multiple issues such as computational speed, data size requirements ...
Mostefa Kara +4 more
semanticscholar +1 more source
The Probabilistic Image Encryption Algorithm Based on Galois Field GF(257)
Journal of the Institution of Electronics and Telecommunication Engineers, 2023Image encryption technology is an essential measure to protect image information from illegal access. A new probabilistic image encryption algorithm with 480-bit external secret key was proposed in this paper.
Yong Zhang +3 more
semanticscholar +1 more source

