Security Evaluation of Pailiar Homormophic Encryption Scheme

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Security of a Class of Image Encryption Scheme

Recently four chaos-based image encryption schemes were proposed. Essentially, the four schemes can be classified as one class, which is composed of two basic parts: position permutation and diffusion of pixel value with the same cipher-text feedback function. The operations involved in the two basic parts are determined by a random number sequence generated by iterating a chaotic dynamic syste...

متن کامل

Security Analysis of the Bitstream Encryption Scheme of Altera FPGAs

Altera provides custom logic solutions and is, besides Xilinx, one of the biggest vendors in their sector. Altera’s Field Programmable Gate Arrays (FPGAs) are SRAM-based devices and thus volatile, which implies that they load their configuration from a configuration device or a flash memory at each new power-up. The FPGA designs are given in the form of a bitstream. In order to protect such a c...

متن کامل

Study And Performance Evaluation Of Security-Throughput Tradeoff With Link Adaptive Encryption Scheme

With the ever increasing volume of information over wireless medium, security has assumed an important dimension. The security of transmitted data over a wireless channel aims at protecting the data from unauthorized intrusion. Wireless network security is achieved using cryptographic primitives. Some properties that give encryption mechanism their cryptographic strength also make them very sen...

متن کامل

Security of a Biometric Identity-based Encryption Scheme

Biometric identity-based encryption (Bio-IBE) is a kind of fuzzy identity-based encryption (fuzzy IBE) where a ciphertext encrypted under an identity w′ can be decrypted using a secret key corresponding to the identity w which is close to w′ as measured by some metric. Recently, Yang et al. proposed a constant-size Bio-IBE scheme and proved that it is secure against adaptive chosen-ciphertext a...

متن کامل

Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme

Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decryption key is created by binding the identifier with a system’s master secret. In 2003 Sakai and Kasahara proposed a new IBE scheme, which has the potential to improve performance. However, to our best knowledge, the security of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Asian Journal of Research in Computer Science

سال: 2020

ISSN: 2581-8260

DOI: 10.9734/ajrcos/2020/v6i330159