Results 21 to 30 of about 493,090 (289)
Methods and Algorithms for Pseudo-probabilistic Encryption with Shared Key
As a method for providing security of the messages sent via a public channel in the case of potential coercive attacks there had been proposed algorithms and protocols of deniable encryption.
Alexandr Moldovyan, Nikolay A. Moldovyan
openalex +3 more sources
Semantic Entanglement-Based Ransomware Detection via Probabilistic Latent Encryption Mapping [PDF]
Encryption-based attacks have introduced significant challenges for detection mechanisms that rely on predefined signatures, heuristic indicators, or static rule-based classifications.
Mohamed Eisa +4 more
openalex +2 more sources
Hierarchical Services of Convolutional Neural Networks via Probabilistic Selective Encryption
Jinyu Tian, Jiantao Zhou, Jia Duan
openalex +2 more sources
Probabilistic Public Key Encryption for Controlled Equijoin in Relational Databases
We present a public key encryption scheme for relational databases (PKDE) that allows the owner to control the execution of cross-relation joins on an outsourced server. The scheme allows anyone to deposit encrypted records in a database on the server.
Yujue Wang, HweeHwa Pang
openalex +5 more sources
How to make RSA and some other encryptions probabilistic
A new scheme of probabilistic subgroup-related encryption is introduced. Some applications of this scheme based on the RSA, Diffie-Hellman and ElGamal encryption algorithms are described. Security assumptions and main advantages of this scheme are discussed.
В. А. Романьков
openalex +4 more sources
Probabilistic encryption & how to play mental poker keeping secret all partial information [PDF]
Shafi Goldwasser, Silvio Micali
openalex +2 more sources
Privacy Preserving and Serverless Homomorphic-Based Searchable Encryption as a Service (SEaaS)
Serverless computing has seen rapid growth, thanks to its adaptability, elasticity, and deployment agility, embraced by both cloud providers and users. However, this surge in serverless adoption has prompted a reevaluation of security concerns and thus ...
Musfirah Ihtesham +6 more
doaj +1 more source
An Introduction to Probabilistic Encryption
An introduction to probabilistic encryption is given, presenting the first probabilistic cryptosystem by Goldwasser and Micali. Furthermore, the required number-theoretic concepts are discussed and the notion of semantic security is presented in an informal way. The article should be comprehensible to students with basic mathematical knowledge.
Georg Fuchsbauer
openalex +3 more sources
Creating a joint secret key in reducing homomorphic encryption for a class of congruent systems
Today special attention is paid to homomorphic encryption in the field of information security. Systems of homomorphic encryption represent such systems that allow arbitrary operations over ciphertext that are homomorphic to algebraic operations with ...
Victor Y. Kadykov, Alla B. Levina
doaj +1 more source
In this paper, a high-security probabilistic constellation shaping transmission scheme based on recurrent neural networks (RNNs) is proposed, in which the constellation point probabilistic distribution is generated based on recurrent neural network ...
Shuyu Zhou +13 more
doaj +1 more source

