Results 41 to 50 of about 505,863 (290)

PROBLEMS WITH A PROBABILISTIC ENCRYPTION SCHEME BASED ON CHAOTIC SYSTEMS [PDF]

open access: yesInternational Journal of Bifurcation and Chaos, 2003
Recently S. Papadimitriou et al. have proposed a new probabilistic encryption scheme based on chaotic systems. In this letter, we point out some problems with Papadimitriou et al.'s chaotic cryptosystem: (1) the size of the ciphertext and the plaintext cannot simultaneously ensure practical implementation and high security; (2) the estimated number of
Li, SJ   +4 more
openaire   +3 more sources

3D PCDM Probabilistic Shaping Transmission Scheme Based on Chaotic Constellation Mapping

open access: yesIEEE Photonics Journal, 2023
In this article, a high-security three-dimensional (3D) probabilistic shaping optical transmission system based on prefix-free code distribution matching (PCDM) and Polar code joint coding is proposed.
Mengjie Wu   +13 more
doaj   +1 more source

2-bit, chained, probabilistic encryption scheme

open access: yesElectronics Letters, 1989
In this letter we present a new probabilistic encryption algorithm based on the scheme proposed by Jingmin and Kaicheng in 1988. This algorithm utilises the public key concept and recursively encrypts two bits at a time. The message bit expansion is very low and is the same as in their scheme. At the same time, this new scheme is twice as fast.
L. Harn, T. Kiesler
openaire   +1 more source

Stream Deniable-Encryption Algorithms [PDF]

open access: yesComputer Science Journal of Moldova, 2016
A method for stream deniable encryption of secret message is proposed, which is computationally indistinguishable from the probabilistic encryption of some fake message. The method uses generation of two key streams with some secure block cipher.
N.A. Moldovyan   +3 more
doaj  

Pindex: Private multi-linked index for encrypted document retrieval.

open access: yesPLoS ONE, 2021
Cryptographic cloud storage is used to make optimal use of the cloud storage infrastructure to outsource sensitive and mission-critical data. The continuous growth of encrypted data outsourced to cloud storage requires continuous updating.
A John Prakash, B Lydia Elizabeth
doaj   +1 more source

Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes

open access: yesIEEE Access, 2019
We study how to make any deterministic encryption scheme probabilistic and secure against adaptively chosen ciphertext attacks. A new transpositional padding encryption scheme is proposed, with which we construct a universal scheme, namely, a ...
Linming Gong   +4 more
doaj   +1 more source

Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms [PDF]

open access: yesJournal of Universal Computer Science, 2019
The existence of natural public-key encryption (PKE) schemes satisfying secretly detectable replayable CCA (sd-RCCA) security is left as open. By introducing probabilistic message authentication codes (MACs) into popular KEM plus DEM paradigms, several ...
Yuan Chen   +4 more
doaj   +3 more sources

Provably sender-deniable encryption scheme [PDF]

open access: yesComputer Science Journal of Moldova, 2015
The use of the well known provably secure public-key cryptoscheme by Rabin is extended for the case of the deniable encryption. In the proposed new sender-deniable encryption scheme the cryptogram is computed as coefficients of quadratic congruence, the
N.A. Moldovyan   +2 more
doaj  

Correctness Verifiable Outsourcing Computation Scheme of Shortest Path Querying over Encrypted Graph Data [PDF]

open access: yesJisuanji kexue
Mass graph data such as geolocation and social networks are widely used and contain massive privacy,usually,it requires varied query services through secure outsourcing computation schemes.However,it is still an open challenge to design correctness ...
DING Hongfa, YU Yingying, JIANG Heling
doaj   +1 more source

Probabilistic encryption key exchange

open access: yesElectronics Letters, 1995
A novel secret key exchange algorithm is proposed. It is based on the properties of the Blum Blum and Shum pseudo-random number generator (the 'x/sup 2/ modN' generator), and on partial disclosure of the secret seed for this generator. The security and other features of the proposed cryptosystem are discussed.
openaire   +1 more source

Home - About - Disclaimer - Privacy