Results 21 to 30 of about 48,518 (327)
Symmetric Public-Key Encryption [PDF]
Public-key encryption would seem to be inherently asymmetric. in that only messages sent to a user can be encrypted using his public key. We demonstrate that the use of interactive protocols for sending encrypted messages enables a symmetric use of public keys; we give cryptographic protocols for the following tasks: 1.
Galil, Zvi, Landau, Gad M., Yung, Moti
openaire +2 more sources
Rethinking Searchable Symmetric Encryption
ISBN:978-1-6654-9336 ...
Zichen Gui +2 more
openaire +2 more sources
A Symmetric Encryption Method for Transmitting IEC 62351 Communicaiton Keys in Substations
With the improvement of the information level of the substation, the cyber security problem of information communication has become increasingly prominent.
Fang FANG +3 more
doaj +1 more source
The Locality of Searchable Symmetric Encryption [PDF]
This paper proves a lower bound on the trade-off between server storage size and the locality of memory accesses in searchable symmetric encryption (SSE). Namely, when encrypting an index of N identifier/keyword pairs, the encrypted index must have size ω(N) or the scheme must perform searching with ω(1) non-contiguous reads to memory or the scheme ...
David Cash, Stefano Tessaro
openaire +2 more sources
On the Security of Symmetric Encryption Against Mass Surveillance
For mass surveillance, the algorithm substitution attacks (ASAs) are serious security threats to the symmetric encryption schemes. At CRYPTO 2014, Bellare, Paterson, and Rogaway (BPR) formally developed the security notions of decryptability ...
Da-Zhi Sun, Yi Mu
doaj +1 more source
An Efficient Solution Towards Secure Homomorphic Symmetric Encryption Algorithms [PDF]
In this paper, we consider Homomorphic Encryption (HE) to process over encrypted data in order to achieve user privacy. We present a framework solution to provide a high level of security for the symmetric HE algorithms.
Hariss Khalil +3 more
doaj +1 more source
Review on DNA Cryptography [PDF]
Cryptography is the science that secures data and communication over the network by applying mathematics and logic to design strong encryption methods.
Mondal, Mandrita, Ray, Kumar S.
core +3 more sources
Remote-Sensing Image Encryption Algorithm Using the Advanced Encryption Standard
With the increasing use of multimedia in communications, the content security of remote-sensing images attracts much attention in both the academia and industry. The Advanced Encryption Standard (AES) is a famous symmetric cryptosystem.
Xiaoqiang Zhang, Xuesong Wang
doaj +1 more source
A Lightweight Policy Update Scheme for Outsourced Personal Health Records Sharing
With high flexibility and accessibility of data outsourcing environment such as cloud computing environment, several healthcare providers implement electronic personal health records (PHRs) to enable individual patients to manage their own health data in
Somchart Fugkeaw
doaj +1 more source
STUDY OF THE CRYPTOGRAPHIC STRENGTH OF THE S-BOX OBTAINED ON THE BASIS OF EXPONENTIATION MODULO
This article presents one of the main transformations of symmetric block ciphers used to protect confidential information, a new method for obtaining a non-linear S block, and an analysis of the results obtained.
Ardabek Khompysh +3 more
doaj +1 more source

