نتایج جستجو برای: encryption

تعداد نتایج: 27368  

2013
Dana Dachman-Soled

We present a construction of a CCA2-secure encryption scheme from a plaintext aware, weakly simulatable public key encryption scheme. The notion of plaintext aware, weakly simulatable public key encryption has been considered previously by Myers, Sergi and shelat (SCN, 2012) and natural encryption schemes such as the Damg̊ard Elgamal Scheme (Damg̊ard, Crypto, 1991) and the Cramer-Shoup Lite Schem...

2015
Shubham Yadav Shikha Singh

With the rapid a advancement in multimedia technology, it has become possible to generate and transmit more and more multimedia data in military commercial and medical field. Some of these data includes some sensitive information which is required to be accessed by the intended person only. Therefore, security and privacy of these information is of prime concern today. In the last couple of yea...

Journal: :IACR Cryptology ePrint Archive 2007
Sunder Lal Priyam Sharma

This paper analyzes the security of an IBE scheme proposed by Wang in 2007. It is shown that under BDHP (which is polynomially time equivalent to BIDHP) assumption the scheme is secure in random oracle model. Key-Words: Public Key Encryption, Identity-Based Encryption (IBE), One-Way Encryption (OWE), One-Way Identity-Based Encryption (ID-OWE).

2017
Daniel Homann Christian Göge Lena Wiese

Though cloud databases offer advantages in terms of maintenance cost, they require encryption in order to protect confidential records. Specialized searchable encryption schemes are needed to provide the functionality of privacy preserving search on encrypted data. In many use cases, a search which also returns the correct documents when the search term was misspelled is very desirable. Therefo...

Journal: :Electronics 2023

With the rapid development of information technology, security images has emerged as a significant area research. This study presents an algorithm that integrates chaotic image encryption and convolutional neural network (CNN) to enhance efficiency. The applies properties randomness nonlinear mapping sequences with advanced feature extraction capabilities CNN model achieve robust encryption. Fi...

2014
Swarup kshatriya

A model by which information technology services being delivered is resources are retrieved from the internet through web-based tools and applications, instead of direct connection to a server. The Data and software packages are stored in servers. However, cloud computing structure allows access to information as long as an electronic device has access to the web. In this technology users have ...

2004
Chiu Yuen Koo Nikolai Yakovenko Jeffrey Blank

The focus of this lecture is efficient public-key encryption. In the previous lecture, we discussed a public-key encryption scheme for 1-bit messages. However, to encrypt an `-bit message, we can simply encrypt ` one-bit messages and send these (and we proved last time that this remains secure in the case of public-key encryption). Here, we first describe (briefly) how to combine public and pri...

Journal: :IJDE 2002
Eoghan Casey

As more criminals use encryption to conceal incriminating evidence, forensic examiners require practical methods for recovering some or all of the encrypted data. This paper presents lessons learned from investigations involving encryption in various contexts. By presenting successful and unsuccessful case examples, this paper gives forensic examiners a clearer understanding of the feasibility ...

2009
Seiko Arita Koji Tsurudome

In this paper, we propose a notion of threshold tag-based encryption schemes that simplifies the notion of threshold identity-based encryption schemes, and we show a conversion from any stag-CCAsecure threshold tag-based encryption schemes to CCA-secure threshold public-key encryption schemes. Moreover, we give two concrete constructions of stag-CCA-secure threshold tag-based encryption schemes...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید