A Security Enhanced Encryption Scheme and Evaluation of Its Cryptographic Security
نویسندگان
چکیده
منابع مشابه
Ekiti State Social Security Scheme (ESSSS) and its Effect on Food Security in Ekiti State, Nigeria
This study was carried out to evaluate the Ekiti State Social Security Scheme (ESSSS) in Nigeria. Specifically, the study estimated the food security status of the beneficiaries and non beneficiaries of the scheme, assessed the effect of the social security scheme on households’ food security status, and identified the constraints to the implementation of the scheme in the state. A three stage ...
متن کاملThe Bit Security of Paillier's Encryption Scheme and Its Applications
At EuroCrypt’99, Paillier proposed a new encryption scheme based on higher residuosity classes. The new scheme was proven to be one-way under the assumption that computing N -residuosity classes in Z∗ N2 is hard. Similarly the scheme can be proven to be semantically secure under a much stronger decisional assumption: given w ∈ Z∗ N2 it is hard to decide if w is an N -residue or not. In this pap...
متن کاملthe geopolitics of afghanistan after september 11, 2001, and its impact on iranian national security
abstract u.s. attack to afghanistan after 9/11 provided opportunities for us who tried to become the dominant power after collapse of ussr and bipolar world. thinkers like fukuyama believed american liberal democrats thought would be universally accepted without resistances. liberal democracy is the best and final model of governance; in this regard, united state has moral responsibilities for...
15 صفحه اولOn the Security of Convertible Multiauthenticated Encryption Scheme and Its Improved Scheme
Abstract Multi-authenticated encryption is an important message transmission technique, which can send message in a secure and authentic way, and allows a group of signers to cooperatively produce a valid authenticated ciphertext so that only the specific recipient can recover the message and verify the signature. In 2008, Wu et al. proposed a convertible multi-authenticated encryption scheme. ...
متن کاملEnhanced Security using Hybrid Encryption Algorithm
Information Security plays a major role in today’s scenario. Cloud computing is a technology that provides access to information and computing resources from anywhere that a network is available. There is a need to secure the data stored on cloud. The main goal behind the design of encryption algorithm must be security against unauthorized attacks. However, for all cloud computing applications,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Entropy
سال: 2019
ISSN: 1099-4300
DOI: 10.3390/e21070701