نتایج جستجو برای: simultaneous encryption
تعداد نتایج: 143810 فیلتر نتایج به سال:
Today, Internet becomes the essential part of our lives. Over 90% of the e-commerce is developed on the Internet. A security algorithm became very necessary for producer-client transactions assurance and the financial applications safety (credit cards, etc.) The RSA algorithm applicability derives from algorithm properties like: confidentiality, safe authentication, data safety and integrity on...
A Cloud data storage system consists of collection of storage servers over the internet which provides long term storage services. The data stored in a third party’s cloud system may cause serious concern over data confidentiality. To keep sensitive user data confidential against un-trusted servers and to provide security, access control in cloud there are some cryptographic techniques speciall...
The growth rate of the internet exceeds day by day. With the fast growth of internet, there is need to protect the sensitive data from unauthorized access. Cryptography plays a major role in the field of network security. There are many encryption techniques available currently to secure the data. In this review paper we will have an overview of encryption techniques. This paper mainly focuses ...
In this paper, we propose a post-quantum public-key encryption scheme whose security depends on a problem arising from a multivariate non-linear indeterminate equation. The security of lattice cryptosystems, which are considered to be the most promising candidate for a post-quantum cryptosystem, is based on the shortest vector problem or the closest vector problem in the discrete linear solutio...
Oblivious Transfer (OT) is an important cryptographic tool, which has found its usage in many crypto protocols, such as Secure Multiparty Computations [9], Certified E-mail [2] and Simultaneous Contract Signing [20]. In this paper, we propose three k-out-of-n OT (OTnk ) protocols based on additive homomorphic encryption. Two of these protocols prohibit malicious behaviors from both sender and r...
The first type of specialized encryption scheme that can be used in secure outsourced storage we will look at is property-preserving encryption. This is encryption where some desired property of the plaintexts is intentionally leaked by the ciphertexts. The two main examples we will study are deterministic encryption, which preserves the equality property, and order preserving encryption, which...
Encryption is the widely used technique to offer security for video communication and considerable numbers of video encryption algorithms have been proposed. The paper explores the literature for already proposed video encryption algorithms with the focus on the working principle of already proposed video encryption schemes. This study is aimed to give readers a quick overview about various vid...
Now a day’s everyone storing there data in cloud because we can’t depends on hard drives if they crash one can’t have backup for ever data. Famous Cloud storage applications are Drop box, Google drive, Sky drive, Box, Amazon cloud drive, Surdoc and Apple icloud. In cloud data security is provided by various security algorithms. In our research we have chosen attribute based encryption technique...
We address the problems of whether t-circular-secure encryption can be based on (t − 1)-circular-secure encryption or on semantic (CPA) security, if t = 1. While for t = 1 a folklore construction, based on CPA-secure encryption, can be used to build a 1-circular-secure encryption with the same secret-key and message space, no such constructions are known for the bit-encryption case, which is of...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید