Results 241 to 250 of about 493,090 (289)
Some of the next articles are maybe not open access.

Fully Homomorphic Encryption Scheme with Probabilistic Encryption Based on Euler’s Theorem and Application in Cloud Computing

2017
Homomorphic encryption is an encryption scheme that allows different operations on encrypted data and produces the same result as well that the operations performed on the plaintext. Homomorphic encryption can be used to enhance the security measure of un-trusted systems which manipulates and stores sensitive data. Therefore, homomorphic encryption can
Vinod Kumar   +3 more
openaire   +3 more sources

Bit-Oriented Quantum Public Key Probabilistic Encryption Schemes

International Journal of Theoretical Physics, 2013
Quantum public-key encryption system provides information confidentiality using quantum mechanics. In this paper, two bit-oriented public key probabilistic encryption schemes are constructed based on a new randomizing method combined with single-qubit rotation.
Da Xiao, Shi-Hui Zheng, Lize Gu
openaire   +3 more sources

A Probabilistic Public-Key Encryption with Ensuring Data Integrity in Cloud Computing

2023 International Conference on Control, Artificial Intelligence, Robotics & Optimization (ICCAIRO), 2023
Researchers are working hard to face various challenges in the fast-moving field of network security and data exchange. When it comes to encryption techniques, efforts vary to address multiple issues such as computational speed, data size requirements ...
Mostefa Kara   +4 more
semanticscholar   +1 more source

The Probabilistic Image Encryption Algorithm Based on Galois Field GF(257)

Journal of the Institution of Electronics and Telecommunication Engineers, 2023
Image encryption technology is an essential measure to protect image information from illegal access. A new probabilistic image encryption algorithm with 480-bit external secret key was proposed in this paper.
Yong Zhang   +3 more
semanticscholar   +1 more source

Coordinated-security based on probabilistic shaping and encryption in MMW-RoF system.

Optics Letters, 2023
A coordinated-security probabilistic shaping (PS) physical layer encryption scheme is proposed for a W-band millimeter-wave radio-over-fiber (MMW-RoF) system.
Yaoqiang Xiao   +4 more
semanticscholar   +1 more source

A Novel Probabilistic Shaping Based Chaotic Encryption for VLC Systems

2023 Asia Communications and Photonics Conference/2023 International Photonics and Optoelectronics Meetings (ACP/POEM), 2023
Visible light communication (VLC) suffers from eavesdropping due to its broadcast nature and channel openness in public areas. In this paper, we propose a low-rate loss distribution matching to generate shaped symbols, further employing chaotic sequences
Jiaqi Chen   +4 more
semanticscholar   +1 more source

Probabilistic Encryption--A Practical Implementation

2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, 2009
This paper aims to provide a practical implementation of a probabilistic cipher by extending on the algorithms by Fuchsbauer, Goldwasser and Micali. We provide details on designing and implementing the cipher and further support our understanding by providing a statistical analysis of our implementation for the key generation, encryption, and ...
Xianping Wu   +3 more
openaire   +2 more sources

An efficient probabilistic encryption scheme

Information Processing Letters, 1990
Our algorithm requires slightly less encrypting and decrypting operations for transmitting a message one bit at a time, and most significantly, our algorithm can be extended to provide for multi-bit encryption and decryption.
Lein Harn, T. Kiesler
openaire   +1 more source

Optimal Probabilistic Encryption for Secure Detection in Wireless Sensor Networks

open access: closedIEEE Transactions on Information Forensics and Security, 2014
Reza Soosahabi   +3 more
openalex   +2 more sources

Deniable encryption protocols based on probabilistic public-key encryption

2017 20th Conference of Open Innovations Association (FRUCT), 2017
The paper proposes a new method for designing deniable encryption protocols characterized in using RSA-like probabilistic public-key encryption algorithms. Sender-, receiver-, and bi-deniable protocols are described. To provide bi-deniability in the case of attacks perfored by an active coercer stage of entity authentication is used in one of described
Andrey Berezin   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy