Results 261 to 270 of about 505,863 (290)
Some of the next articles are maybe not open access.
Stream deniable-encryption computationally indistinguishable from probabilistic ciphering
2015 XVIII International Conference on Soft Computing and Measurements (SCM), 2015For the first time it is proposed a stream deniable-encryption algorithm. The algorithm generates cryptogram that is computationally indistinguishable from the cryptogram produced by some probabilistic encryption algorithm, called associated probabilistic algorithm, while ciphering a fake message with a fake key.
A. N. Berezin +2 more
openaire +1 more source
Investigation of probabilistic encryption method based on 3-LFSR
2010 International Conference on Computer Application and System Modeling (ICCASM 2010), 2010This paper investigates a new method of probabilistic encryption scheme based on the third-order linear feedback shift register sequence (3-LFSR). The message can be hidden in the exponent. From the definition of LFSR residue problem in Zn, the proposed encryption scheme has property of semantic security, and messages can be concealed better than ...
Zheng-Tao Jiang +4 more
openaire +1 more source
Probabilistic Encryption--A Comparative Analysis against RSA and ECC
2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, 2009This paper aims to provide a comparative analysis of the probabilistic versus the deterministic security models. We provide a benchmark by practically implementing and comparing three ciphers - Probabilistic Cipher (PC), RSA, and ECC. This paper provides the algorithms to implement these ciphers as well as highlights the operating time and performance ...
Orhio Mark Creado +3 more
openaire +1 more source
Cryptanalysis of a knapsack-based probabilistic encryption scheme
Information Sciences, 2009zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +1 more source
Effective Oblivious Transfer Using a Probabilistic Encryption
2013Some novel effective 1-out-of-2, 1-out-of-n, n−1-out-of-n, andm-out-of-n interactive and non-interactive oblivious transfer protocols (OT protocols) using a probabilistic encryption are presented. Their key information is adapted from corresponding Bellare − Rivest fractional OT protocols and the encryption is carried out on ElGamal.
openaire +1 more source
Improved cryptanalysis of a knapsack-based probabilistic encryption scheme
Information Sciences, 2013Wang et al. [B. Wang, Q. Wu, Y. Hu, Information Sciences 177 (2007)] proposed a knapsack-based probabilistic encryption scheme with non-binary coefficients which enjoys a high density larger than 1.06 in the worst case. In this work, we successfully attack this scheme by showing that a public key and a restriction on system parameters allow the ...
openaire +1 more source
An Enhanced Probabilistic Encryption Algorithm for Secured Data Transmission
2012In this paper, we propose a modification probabilistic encryption algorithm by generating Basins (sub keys) dynamically. A probabilistic encryption produces more than one cipher text for the same plaintext. In probabilistic encryption, we use a secret shared key matrix. We multiply this key matrix with a matrix formed from ternary vector and then apply
K. Adi Narayana Reddy +2 more
openaire +1 more source
Predicate Encryption from Bilinear Maps and One-Sided Probabilistic Rank
2019In predicate encryption for a function f, an authority can create ciphertexts and secret keys which are associated with ‘attributes’. A user with decryption key \(K_y\) corresponding to attribute y can decrypt a ciphertext \(CT_x\) corresponding to a message m and attribute x if and only if \(f(x,y)=0\).
Josh Alman, Robin Hui
openaire +1 more source
Probabilistic Buckshot-Driven Cluster Head Identification and Accumulative Data Encryption in WSN
J. Circuits Syst. Comput., 2022P. Srinivasu +3 more
semanticscholar +1 more source

