نتایج جستجو برای: encryption

تعداد نتایج: 27368  

Journal: :Optics letters 2010
A Alfalou C Brosseau

We propose and analyze a dual encryption/decryption scheme, motivated by recent interest in polarization encoding. Compared to standard optical encryption methods, which are based on phase and amplitude manipulation, this encryption procedure relying on Mueller-Stokes formalism provides large flexibility in the key encryption design. The effectiveness of our algorithm is discussed, thanks to a ...

Journal: :JCP 2014
Guoyan Zhang

As an extension of identity-based encryption scheme, attribute-based encryption scheme also has the key escrow problem. Multi-authority attribute-based encryption schemes are principal solution, but it is at the cost of the introducing extra infrastructure and communication. This paper introduces the concept of attribute-based certificatless encryption system (ABCE), which is a new approach to ...

2013
Prachi Saxena Sini Shibu

With the rapid growing of internet, information security becomes significant to protect secret and personal data. Encryption algorithm plays an important role for data security. In this paper, authors have evaluated the performance of two symmetric key encryption algorithms: BEST and NJJSAA used for data encryption and Analysed the encryption security, evaluated encryption speed for both algori...

Journal: :JCP 2013
Minqing Zhang Xu An Wang Weihua Li Xiaoyuan Yang

hosen ciphertext security (CCA security)hosen ciphertext security (CCA security)C is now a widely accepted necessary security notion for public key encryption. CCA secure public verifiable public key encryption has many applications such as threshold public key encryption and proxy re-encryption etc. Furthermore, these years “random oracle model” has seen risen criticize by many cryptographers....

Journal: :IACR Cryptology ePrint Archive 2013
Dan Boneh Ananth Raghunathan Gil Segev

Boneh, Raghunathan, and Segev (CRYPTO ’13) have recently put forward the notion of function privacy and applied it to identity-based encryption, motivated by the need for providing predicate privacy in public-key searchable encryption. Intuitively, their notion asks that decryption keys reveal essentially no information on their corresponding identities, beyond the absolute minimum necessary. W...

2012
Vipul Goyal Virendra Kumar Satyanarayana V. Lokam Mohammad Mahmoody

We prove that there is no black-box construction of a threshold predicate encryption system from identity-based encryption. Our result signifies nontrivial progress in a line of research suggested by Boneh, Sahai and Waters (TCC ’11), where they proposed a study of the relative power of predicate encryption for different functionalities. We rely on and extend the techniques of Boneh et al. (FOC...

Journal: :Electr. Notes Theor. Comput. Sci. 2005
Yannick Chevalier Ralf Küsters Michaël Rusinowitch Mathieu Turuani

Many cryptographic protocols and attacks on these protocols make use of the fact that the order in which encryption is performed does not affect the result of the encryption, i.e., encryption is commutative. However, most models for the automatic analysis of cryptographic protocols can not handle such encryption functions since in these models the message space is considered a free term algebra...

Journal: :I. J. Network Security 2007
Dayin Wang Dongdai Lin Wenling Wu

In this paper, we discuss using CTR mode, another standard encryption mode, to attack other standard encryption modes and using other standard encryption modes to attack CTR mode under the related-mode attack model. In particular, we point out that when the adversary has access to an oracle under one proper mode, then almost all other related-cipher modes, whether they are encryption modes or a...

2008
CIPRIAN RĂCUCIU NICOLAE JULA CONSTANTIN BĂLAN COSMIN ADOMNICĂI

A real-time video encryption module, developed to be used on an electrical accelerated mini-helicopter (UAV), is presented in this paper. The surveillance system is composed from six modules: image capture, encryption, two radio link modules, decryption and display module. The hart of the encryption system is the CV700C motherboard and it’s VIA C7 microprocessor with ultra low power consumption...

2014
S. Aruljothi

In today’s internet world where nothing is secure, since the communication by transmitting of digital products over the open network occur very frequently the security of information is very important. Everyday so many techniques are evolving to make message and image secure with high rate of security. Some of the encryption techniques used selective part of an image for encryption and some oth...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید