Results 21 to 30 of about 505,863 (290)

Deniable encryption protocols based on probabilistic public-key encryption

open access: green2017 20th Conference of Open Innovations Association (FRUCT), 2017
The paper proposes a new method for designing deniable encryption protocols characterized in using RSA-like probabilistic public-key encryption algorithms. Sender-, receiver-, and bi-deniable protocols are described. To provide bi-deniability in the case of attacks perfored by an active coercer stage of entity authentication is used in one of described
Nikolay A. Moldovyan   +3 more
openalex   +3 more sources

Probabilistic Public Key Encryption with Equality Test

open access: green, 2010
We present a (probabilistic) public key encryption (PKE) scheme such that when being implemented in a bilinear group, anyone is able to check whether two ciphertexts are encryptions of the same message. Interestingly, bilinear map operations are not required in key generation, encryption or decryption procedures of the PKE scheme, but is only required ...
Guomin Yang   +3 more
openalex   +4 more sources

A lightweight trusted framework for secure data exchange and threat mitigation in IoT-enabled healthcare environments [PDF]

open access: yesScientific Reports
The rapid adoption of the Internet of Things (IoT) in healthcare has revolutionized patient monitoring and real-time medical decision-making but also introduced significant security and privacy challenges.
Pramit Kumar Samant   +3 more
doaj   +2 more sources

How to make RSA and some other encryptions probabilistic [PDF]

open access: green, 2016
A new scheme of probabilistic subgroup-related encryption is introduced. Some applications of this scheme based on the RSA, Diffie-Hellman and ElGamal encryption algorithms are described. Security assumptions and main advantages of this scheme are discussed.
В. А. Романьков
openalex   +3 more sources

Probabilistic Public Key Encryption for Controlled Equijoin in Relational Databases [PDF]

open access: bronzeThe Computer Journal, 2016
We present a public key encryption scheme for relational databases (PKDE) that allows the owner to control the execution of cross-relation joins on an outsourced server. The scheme allows anyone to deposit encrypted records in a database on the server.
Yujue Wang, HweeHwa Pang
openalex   +4 more sources

Characterization of Security Notions for Probabilistic Private-Key Encryption [PDF]

open access: bronzeJournal of Cryptology, 2005
The development of precise definitions of security for encryption, as well as a detailed understanding of their relationships, has been a major area of research in modern cryptography. Here, we focus on the case of private-key encryption.
Jonathan Katz, Moti Yung
openalex   +2 more sources

Explicit Randomness is not Necessary when Modeling Probabilistic Encryption

open access: diamondElectronic Notes in Theoretical Computer Science, 2007
Although good encryption functions are probabilistic, most symbolic models do not capture this aspect explicitly. A typical solution, recently used to prove the soundness of such models with respect to computational ones, is to explicitly represent the dependency of ciphertexts on random coins as labels. In order to make these label-based models useful,
Véronique Cortier   +2 more
openalex   +5 more sources

A Symmetric Searchable Encryption Identification of Data on Probabilistic Trapdoors

open access: diamondInternational Journal of Engineering and Advanced Technology, 2020
Accessible Encryption (SE) permits a client in accordance with transfer records in accordance with the astronaut and according to seem thru it of a faraway manner while defending the security concerning each the statistics yet the inquiries. Right now, entrust a generative then the simple in imitation of actualize Symmetric Searchable Encryption Scheme
N. V. V. Satyanarayana   +4 more
openalex   +2 more sources

Secure IoT Systems Monitor Framework using Probabilistic Image Encryption [PDF]

open access: diamondInternational Journal of Advanced Engineering, Management and Science, 2020
P.G. Narmadha, K Pooja, K. Muthulakshmi
openalex   +2 more sources

Home - About - Disclaimer - Privacy