Results 21 to 30 of about 493,090 (289)

Methods and Algorithms for Pseudo-probabilistic Encryption with Shared Key

open access: diamondSPIIRAS Proceedings, 2018
As a method for providing security of the messages sent via a public channel in the case of potential coercive attacks there had been proposed algorithms and protocols of deniable encryption.
Alexandr Moldovyan, Nikolay A. Moldovyan
openalex   +3 more sources

Semantic Entanglement-Based Ransomware Detection via Probabilistic Latent Encryption Mapping [PDF]

open access: greenarXiv.org
Encryption-based attacks have introduced significant challenges for detection mechanisms that rely on predefined signatures, heuristic indicators, or static rule-based classifications.
Mohamed Eisa   +4 more
openalex   +2 more sources

Probabilistic Public Key Encryption for Controlled Equijoin in Relational Databases

open access: greenThe Computer Journal, 2016
We present a public key encryption scheme for relational databases (PKDE) that allows the owner to control the execution of cross-relation joins on an outsourced server. The scheme allows anyone to deposit encrypted records in a database on the server.
Yujue Wang, HweeHwa Pang
openalex   +5 more sources

How to make RSA and some other encryptions probabilistic

open access: green, 2016
A new scheme of probabilistic subgroup-related encryption is introduced. Some applications of this scheme based on the RSA, Diffie-Hellman and ElGamal encryption algorithms are described. Security assumptions and main advantages of this scheme are discussed.
В. А. Романьков
openalex   +4 more sources

Privacy Preserving and Serverless Homomorphic-Based Searchable Encryption as a Service (SEaaS)

open access: yesIEEE Access, 2023
Serverless computing has seen rapid growth, thanks to its adaptability, elasticity, and deployment agility, embraced by both cloud providers and users. However, this surge in serverless adoption has prompted a reevaluation of security concerns and thus ...
Musfirah Ihtesham   +6 more
doaj   +1 more source

An Introduction to Probabilistic Encryption

open access: closedOsječki matematički list, 2006
An introduction to probabilistic encryption is given, presenting the first probabilistic cryptosystem by Goldwasser and Micali. Furthermore, the required number-theoretic concepts are discussed and the notion of semantic security is presented in an informal way. The article should be comprehensible to students with basic mathematical knowledge.
Georg Fuchsbauer
openalex   +3 more sources

Creating a joint secret key in reducing homomorphic encryption for a class of congruent systems

open access: yesБезопасность информационных технологий, 2021
Today special attention is paid to homomorphic encryption in the field of information security. Systems of homomorphic encryption represent such systems that allow arbitrary operations over ciphertext that are homomorphic to algebraic operations with ...
Victor Y. Kadykov, Alla B. Levina
doaj   +1 more source

A High-Security Probabilistic Constellation Shaping Transmission Scheme Based on Recurrent Neural Networks

open access: yesPhotonics, 2023
In this paper, a high-security probabilistic constellation shaping transmission scheme based on recurrent neural networks (RNNs) is proposed, in which the constellation point probabilistic distribution is generated based on recurrent neural network ...
Shuyu Zhou   +13 more
doaj   +1 more source

Home - About - Disclaimer - Privacy