منابع مشابه
Symmetric and Asymmetric Rounding
If rounded data are used in estimating moments and regression coffiecients, the estimates are typically more or less biased. The purpose of the paper is to study the bias inducing effect of rounding, which is also seen when population moments intstead of their estimates are considered. Under appropriate conditions this effect can be approximately specified by versions of Sheppard’s correction f...
متن کاملMultimedia asymmetric watermarking and encryption
An asymmetric watermarking algorithm is presented, involving a private key for embedding and a public key for detection, joint with a suitable encryption scheme, thus achieving a double security level for digital data protection. A commutative scheme is designed based on linear algebra and on a secret random permutation, allowing both to cipher watermarked data and to mark encrypted data withou...
متن کاملLecture 10 Asymmetric Encryption
Recall that in the last lecture we discussed cryptographic security in the symmetric setting. The typical arrangement is that Alice and Bob share a common key that they use for encryption and decryption. This shared secret creates an distinction between the communicating parties (Alice and Bob) and the adversarial eavesdropper (Eve). The goal in this setting is to ensure that without the shared...
متن کاملDistributed Searchable Asymmetric Encryption
Searchable asymmetric encryption (SAE) can also be called Public Key Encryption with Keyword Search (PEKS), which allows us to search the keyword on the data of having been encrypted. The essence of Asymmetric searchable encryption is that users exchange the data of encryption, one party sends a ciphertext with key encryption, and the other party with another key receives the ciphertext. Encryp...
متن کاملProperty Preserving Symmetric Encryption
Processing on encrypted data is a subject of rich investigation. Several new and exotic encryption schemes, supporting a diverse set of features, have been developed for this purpose. We consider encryption schemes that are suitable for applications such as data clustering on encrypted data. In such applications, the processing algorithm needs to learn certain properties about the encrypted dat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Computing Surveys
سال: 1979
ISSN: 0360-0300,1557-7341
DOI: 10.1145/356789.356793