Results 241 to 250 of about 493,090 (289)
Some of the next articles are maybe not open access.
2017
Homomorphic encryption is an encryption scheme that allows different operations on encrypted data and produces the same result as well that the operations performed on the plaintext. Homomorphic encryption can be used to enhance the security measure of un-trusted systems which manipulates and stores sensitive data. Therefore, homomorphic encryption can
Vinod Kumar +3 more
openaire +3 more sources
Homomorphic encryption is an encryption scheme that allows different operations on encrypted data and produces the same result as well that the operations performed on the plaintext. Homomorphic encryption can be used to enhance the security measure of un-trusted systems which manipulates and stores sensitive data. Therefore, homomorphic encryption can
Vinod Kumar +3 more
openaire +3 more sources
Bit-Oriented Quantum Public Key Probabilistic Encryption Schemes
International Journal of Theoretical Physics, 2013Quantum public-key encryption system provides information confidentiality using quantum mechanics. In this paper, two bit-oriented public key probabilistic encryption schemes are constructed based on a new randomizing method combined with single-qubit rotation.
Da Xiao, Shi-Hui Zheng, Lize Gu
openaire +3 more sources
A Probabilistic Public-Key Encryption with Ensuring Data Integrity in Cloud Computing
2023 International Conference on Control, Artificial Intelligence, Robotics & Optimization (ICCAIRO), 2023Researchers are working hard to face various challenges in the fast-moving field of network security and data exchange. When it comes to encryption techniques, efforts vary to address multiple issues such as computational speed, data size requirements ...
Mostefa Kara +4 more
semanticscholar +1 more source
The Probabilistic Image Encryption Algorithm Based on Galois Field GF(257)
Journal of the Institution of Electronics and Telecommunication Engineers, 2023Image encryption technology is an essential measure to protect image information from illegal access. A new probabilistic image encryption algorithm with 480-bit external secret key was proposed in this paper.
Yong Zhang +3 more
semanticscholar +1 more source
Coordinated-security based on probabilistic shaping and encryption in MMW-RoF system.
Optics Letters, 2023A coordinated-security probabilistic shaping (PS) physical layer encryption scheme is proposed for a W-band millimeter-wave radio-over-fiber (MMW-RoF) system.
Yaoqiang Xiao +4 more
semanticscholar +1 more source
A Novel Probabilistic Shaping Based Chaotic Encryption for VLC Systems
2023 Asia Communications and Photonics Conference/2023 International Photonics and Optoelectronics Meetings (ACP/POEM), 2023Visible light communication (VLC) suffers from eavesdropping due to its broadcast nature and channel openness in public areas. In this paper, we propose a low-rate loss distribution matching to generate shaped symbols, further employing chaotic sequences
Jiaqi Chen +4 more
semanticscholar +1 more source
Probabilistic Encryption--A Practical Implementation
2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, 2009This paper aims to provide a practical implementation of a probabilistic cipher by extending on the algorithms by Fuchsbauer, Goldwasser and Micali. We provide details on designing and implementing the cipher and further support our understanding by providing a statistical analysis of our implementation for the key generation, encryption, and ...
Xianping Wu +3 more
openaire +2 more sources
An efficient probabilistic encryption scheme
Information Processing Letters, 1990Our algorithm requires slightly less encrypting and decrypting operations for transmitting a message one bit at a time, and most significantly, our algorithm can be extended to provide for multi-bit encryption and decryption.
Lein Harn, T. Kiesler
openaire +1 more source
Optimal Probabilistic Encryption for Secure Detection in Wireless Sensor Networks
Reza Soosahabi +3 more
openalex +2 more sources
Deniable encryption protocols based on probabilistic public-key encryption
2017 20th Conference of Open Innovations Association (FRUCT), 2017The paper proposes a new method for designing deniable encryption protocols characterized in using RSA-like probabilistic public-key encryption algorithms. Sender-, receiver-, and bi-deniable protocols are described. To provide bi-deniability in the case of attacks perfored by an active coercer stage of entity authentication is used in one of described
Andrey Berezin +3 more
openaire +2 more sources

