Results 261 to 270 of about 505,863 (290)
Some of the next articles are maybe not open access.

Stream deniable-encryption computationally indistinguishable from probabilistic ciphering

2015 XVIII International Conference on Soft Computing and Measurements (SCM), 2015
For the first time it is proposed a stream deniable-encryption algorithm. The algorithm generates cryptogram that is computationally indistinguishable from the cryptogram produced by some probabilistic encryption algorithm, called associated probabilistic algorithm, while ciphering a fake message with a fake key.
A. N. Berezin   +2 more
openaire   +1 more source

Investigation of probabilistic encryption method based on 3-LFSR

2010 International Conference on Computer Application and System Modeling (ICCASM 2010), 2010
This paper investigates a new method of probabilistic encryption scheme based on the third-order linear feedback shift register sequence (3-LFSR). The message can be hidden in the exponent. From the definition of LFSR residue problem in Zn, the proposed encryption scheme has property of semantic security, and messages can be concealed better than ...
Zheng-Tao Jiang   +4 more
openaire   +1 more source

Probabilistic Encryption--A Comparative Analysis against RSA and ECC

2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, 2009
This paper aims to provide a comparative analysis of the probabilistic versus the deterministic security models. We provide a benchmark by practically implementing and comparing three ciphers - Probabilistic Cipher (PC), RSA, and ECC. This paper provides the algorithms to implement these ciphers as well as highlights the operating time and performance ...
Orhio Mark Creado   +3 more
openaire   +1 more source

Cryptanalysis of a knapsack-based probabilistic encryption scheme

Information Sciences, 2009
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +1 more source

Effective Oblivious Transfer Using a Probabilistic Encryption

2013
Some novel effective 1-out-of-2, 1-out-of-n, n−1-out-of-n, andm-out-of-n interactive and non-interactive oblivious transfer protocols (OT protocols) using a probabilistic encryption are presented. Their key information is adapted from corresponding Bellare − Rivest fractional OT protocols and the encryption is carried out on ElGamal.
openaire   +1 more source

Improved cryptanalysis of a knapsack-based probabilistic encryption scheme

Information Sciences, 2013
Wang et al. [B. Wang, Q. Wu, Y. Hu, Information Sciences 177 (2007)] proposed a knapsack-based probabilistic encryption scheme with non-binary coefficients which enjoys a high density larger than 1.06 in the worst case. In this work, we successfully attack this scheme by showing that a public key and a restriction on system parameters allow the ...
openaire   +1 more source

An Enhanced Probabilistic Encryption Algorithm for Secured Data Transmission

2012
In this paper, we propose a modification probabilistic encryption algorithm by generating Basins (sub keys) dynamically. A probabilistic encryption produces more than one cipher text for the same plaintext. In probabilistic encryption, we use a secret shared key matrix. We multiply this key matrix with a matrix formed from ternary vector and then apply
K. Adi Narayana Reddy   +2 more
openaire   +1 more source

Predicate Encryption from Bilinear Maps and One-Sided Probabilistic Rank

2019
In predicate encryption for a function f, an authority can create ciphertexts and secret keys which are associated with ‘attributes’. A user with decryption key \(K_y\) corresponding to attribute y can decrypt a ciphertext \(CT_x\) corresponding to a message m and attribute x if and only if \(f(x,y)=0\).
Josh Alman, Robin Hui
openaire   +1 more source

Probabilistic Buckshot-Driven Cluster Head Identification and Accumulative Data Encryption in WSN

J. Circuits Syst. Comput., 2022
P. Srinivasu   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy