Results 261 to 270 of about 493,090 (289)
Some of the next articles are maybe not open access.

Cryptanalysis of a knapsack-based probabilistic encryption scheme

Information Sciences, 2009
Wang et al. B. Wang, Q. Wu, Y. Hu, A knapsack-based probabilistic encryption scheme, Information Sciences 177(19) (2007) 3981-3994] proposed a high density knapsack-based probabilistic encryption scheme with non-binary coefficients. In this paper, we present a heuristic attack that can be used to recover the private key parameters from the known public
openaire   +2 more sources

Probabilistic Shaping Encryption Scheme Based on Dual-Parameter Bit-Weighted Distribution Matching in MMW-RoF System

Journal of Lightwave Technology
In order to face the challenges of reliable performance and physical layer security performance in millimeter-wave radio-over-fiber (MMW-RoF), a probabilistic shaping (PS) encryption scheme based on dual-parameter bit-weighted distribution matching is ...
Yaoqiang Xiao   +5 more
semanticscholar   +1 more source

Proofs of Encrypted Data Retrievability with Probabilistic and Homomorphic Message Authenticators

2015 IEEE Trustcom/BigDataSE/ISPA, 2015
When users store their data on a cloud, they may concern on whether their data is stored correctly and can be fully retrieved. Proofs of Retrivability (PoR) is a cryptographic concept that allows users to remotely check the integrity of their data without downloading. This check is usually done by attaching data with message authenticators that contain
John Zic, Dongxi Liu
openaire   +2 more sources

An Enhanced Probabilistic Encryption Algorithm for Secured Data Transmission

2012
In this paper, we propose a modification probabilistic encryption algorithm by generating Basins (sub keys) dynamically. A probabilistic encryption produces more than one cipher text for the same plaintext. In probabilistic encryption, we use a secret shared key matrix. We multiply this key matrix with a matrix formed from ternary vector and then apply
K. Adi Narayana Reddy   +2 more
openaire   +2 more sources

A probabilistic encryption using very high residuosity and its applications

Proceedings of GLOBECOM '95, 2002
In this paper, we propose a new probabilistic encryption whose security is based on the /spl gamma//sup th/-residuosity assumption for very large /spl gamma/ with the form O(poly/sub 1/(k))(O(poly/sub 2/(k))). The proposed scheme is the first probabilistic encryption which has an exponential size of message space and is polynomially secure.
Dong Ho Won, Bo Young Lee, Sung Jun Park
openaire   +2 more sources

Improved cryptanalysis of a knapsack-based probabilistic encryption scheme

Information Sciences, 2013
Wang et al. [B. Wang, Q. Wu, Y. Hu, Information Sciences 177 (2007)] proposed a knapsack-based probabilistic encryption scheme with non-binary coefficients which enjoys a high density larger than 1.06 in the worst case. In this work, we successfully attack this scheme by showing that a public key and a restriction on system parameters allow the ...
openaire   +1 more source

Effective Oblivious Transfer Using a Probabilistic Encryption

2013
Some novel effective 1-out-of-2, 1-out-of-n, nāˆ’1-out-of-n, andm-out-of-n interactive and non-interactive oblivious transfer protocols (OT protocols) using a probabilistic encryption are presented. Their key information is adapted from corresponding Bellare āˆ’ Rivest fractional OT protocols and the encryption is carried out on ElGamal.
openaire   +2 more sources

Probabilistic Buckshot-Driven Cluster Head Identification and Accumulative Data Encryption in WSN

J. Circuits Syst. Comput., 2022
P. Srinivasu   +3 more
semanticscholar   +1 more source

Hybrid probabilistic triple encryption approach for data security in cloud computing

Int. J. Adv. Intell. Paradigms, 2022
Vartika Kulshrestha   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy