Results 21 to 30 of about 46,684 (278)

Searchable Symmetric Encryption

open access: yes, 2023
AbstractSearchable symmetric encryption allows operating on encrypted data, particularly keyword-based search on documents and range-based search on spatial data. Various methods can be used in Searchable symmetric encryption, such as order-preserving or fully homomorphic encryption, for different levels of information leakage.
Cyrill Krähenbühl, Adrian Perrig
openaire   +1 more source

Substring-Searchable Symmetric Encryption [PDF]

open access: yesProceedings on Privacy Enhancing Technologies, 2015
Abstract In this paper, we consider a setting where a client wants to outsource storage of a large amount of private data and then perform substring search queries on the data – given a data string s and a search string p, find all occurrences of p as a substring of s.
Melissa Chase, Emily Shen
openaire   +1 more source

An Efficient Solution Towards Secure Homomorphic Symmetric Encryption Algorithms [PDF]

open access: yesITM Web of Conferences, 2019
In this paper, we consider Homomorphic Encryption (HE) to process over encrypted data in order to achieve user privacy. We present a framework solution to provide a high level of security for the symmetric HE algorithms.
Hariss Khalil   +3 more
doaj   +1 more source

Remote-Sensing Image Encryption Algorithm Using the Advanced Encryption Standard

open access: yesApplied Sciences, 2018
With the increasing use of multimedia in communications, the content security of remote-sensing images attracts much attention in both the academia and industry. The Advanced Encryption Standard (AES) is a famous symmetric cryptosystem.
Xiaoqiang Zhang, Xuesong Wang
doaj   +1 more source

A Lightweight Policy Update Scheme for Outsourced Personal Health Records Sharing

open access: yesIEEE Access, 2021
With high flexibility and accessibility of data outsourcing environment such as cloud computing environment, several healthcare providers implement electronic personal health records (PHRs) to enable individual patients to manage their own health data in
Somchart Fugkeaw
doaj   +1 more source

STUDY OF THE CRYPTOGRAPHIC STRENGTH OF THE S-BOX OBTAINED ON THE BASIS OF EXPONENTIATION MODULO

open access: yesScientific Journal of Astana IT University, 2022
This article presents one of the main transformations of symmetric block ciphers used to protect confidential information, a new method for obtaining a non-linear S block, and an analysis of the results obtained.
Ardabek Khompysh   +3 more
doaj   +1 more source

The Case for Quantum Key Distribution [PDF]

open access: yes, 2009
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures.
A.R. Dixon   +20 more
core   +8 more sources

Effective Caching for the Secure Content Distribution in Information-Centric Networking

open access: yes, 2018
The secure distribution of protected content requires consumer authentication and involves the conventional method of end-to-end encryption. However, in information-centric networking (ICN) the end-to-end encryption makes the content caching ineffective ...
Bilal, Muhammad   +2 more
core   +1 more source

Images Encryption Method using Steganographic LSB Method, AES and RSA algorithm

open access: yesNonlinear Engineering, 2017
Vulnerability of communication of digital images is an extremely important issue nowadays, particularly when the images are communicated through insecure channels.
Moumen Abdelkader, Sissaoui Hocine
doaj   +1 more source

A Novel Latin Square Image Cipher

open access: yes, 2012
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color images. Our contributions to the image encryption community include 1) we develop new Latin square image encryption primitives including Latin Square ...
Aaronson   +45 more
core   +1 more source

Home - About - Disclaimer - Privacy