Deniable encryption protocols based on probabilistic public-key encryption
The paper proposes a new method for designing deniable encryption protocols characterized in using RSA-like probabilistic public-key encryption algorithms. Sender-, receiver-, and bi-deniable protocols are described. To provide bi-deniability in the case of attacks perfored by an active coercer stage of entity authentication is used in one of described
Nikolay A. Moldovyan +3 more
openalex +3 more sources
Probabilistic Public Key Encryption with Equality Test
We present a (probabilistic) public key encryption (PKE) scheme such that when being implemented in a bilinear group, anyone is able to check whether two ciphertexts are encryptions of the same message. Interestingly, bilinear map operations are not required in key generation, encryption or decryption procedures of the PKE scheme, but is only required ...
Guomin Yang +3 more
openalex +4 more sources
A lightweight trusted framework for secure data exchange and threat mitigation in IoT-enabled healthcare environments [PDF]
The rapid adoption of the Internet of Things (IoT) in healthcare has revolutionized patient monitoring and real-time medical decision-making but also introduced significant security and privacy challenges.
Pramit Kumar Samant +3 more
doaj +2 more sources
How to make RSA and some other encryptions probabilistic [PDF]
A new scheme of probabilistic subgroup-related encryption is introduced. Some applications of this scheme based on the RSA, Diffie-Hellman and ElGamal encryption algorithms are described. Security assumptions and main advantages of this scheme are discussed.
В. А. Романьков
openalex +3 more sources
Probabilistic Public Key Encryption for Controlled Equijoin in Relational Databases [PDF]
We present a public key encryption scheme for relational databases (PKDE) that allows the owner to control the execution of cross-relation joins on an outsourced server. The scheme allows anyone to deposit encrypted records in a database on the server.
Yujue Wang, HweeHwa Pang
openalex +4 more sources
Characterization of Security Notions for Probabilistic Private-Key Encryption [PDF]
The development of precise definitions of security for encryption, as well as a detailed understanding of their relationships, has been a major area of research in modern cryptography. Here, we focus on the case of private-key encryption.
Jonathan Katz, Moti Yung
openalex +2 more sources
Explicit Randomness is not Necessary when Modeling Probabilistic Encryption
Although good encryption functions are probabilistic, most symbolic models do not capture this aspect explicitly. A typical solution, recently used to prove the soundness of such models with respect to computational ones, is to explicitly represent the dependency of ciphertexts on random coins as labels. In order to make these label-based models useful,
Véronique Cortier +2 more
openalex +5 more sources
A Symmetric Searchable Encryption Identification of Data on Probabilistic Trapdoors
Accessible Encryption (SE) permits a client in accordance with transfer records in accordance with the astronaut and according to seem thru it of a faraway manner while defending the security concerning each the statistics yet the inquiries. Right now, entrust a generative then the simple in imitation of actualize Symmetric Searchable Encryption Scheme
N. V. V. Satyanarayana +4 more
openalex +2 more sources
Secure IoT Systems Monitor Framework using Probabilistic Image Encryption [PDF]
P.G. Narmadha, K Pooja, K. Muthulakshmi
openalex +2 more sources
Probabilistic encryption & how to play mental poker keeping secret all partial information [PDF]
Shafi Goldwasser, Silvio Micali
openalex +2 more sources

