Security Evaluation of Pailiar Homormophic Encryption Scheme
نویسندگان
چکیده
منابع مشابه
On the Security of a Class of Image Encryption Scheme
Recently four chaos-based image encryption schemes were proposed. Essentially, the four schemes can be classified as one class, which is composed of two basic parts: position permutation and diffusion of pixel value with the same cipher-text feedback function. The operations involved in the two basic parts are determined by a random number sequence generated by iterating a chaotic dynamic syste...
متن کاملSecurity Analysis of the Bitstream Encryption Scheme of Altera FPGAs
Altera provides custom logic solutions and is, besides Xilinx, one of the biggest vendors in their sector. Altera’s Field Programmable Gate Arrays (FPGAs) are SRAM-based devices and thus volatile, which implies that they load their configuration from a configuration device or a flash memory at each new power-up. The FPGA designs are given in the form of a bitstream. In order to protect such a c...
متن کاملStudy And Performance Evaluation Of Security-Throughput Tradeoff With Link Adaptive Encryption Scheme
With the ever increasing volume of information over wireless medium, security has assumed an important dimension. The security of transmitted data over a wireless channel aims at protecting the data from unauthorized intrusion. Wireless network security is achieved using cryptographic primitives. Some properties that give encryption mechanism their cryptographic strength also make them very sen...
متن کاملSecurity of a Biometric Identity-based Encryption Scheme
Biometric identity-based encryption (Bio-IBE) is a kind of fuzzy identity-based encryption (fuzzy IBE) where a ciphertext encrypted under an identity w′ can be decrypted using a secret key corresponding to the identity w which is close to w′ as measured by some metric. Recently, Yang et al. proposed a constant-size Bio-IBE scheme and proved that it is secure against adaptive chosen-ciphertext a...
متن کاملSecurity Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decryption key is created by binding the identifier with a system’s master secret. In 2003 Sakai and Kasahara proposed a new IBE scheme, which has the potential to improve performance. However, to our best knowledge, the security of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Asian Journal of Research in Computer Science
سال: 2020
ISSN: 2581-8260
DOI: 10.9734/ajrcos/2020/v6i330159