نتایج جستجو برای: simultaneous encryption
تعداد نتایج: 143810 فیلتر نتایج به سال:
With the rapid a advancement in multimedia technology, it has become possible to generate and transmit more and more multimedia data in military commercial and medical field. Some of these data includes some sensitive information which is required to be accessed by the intended person only. Therefore, security and privacy of these information is of prime concern today. In the last couple of yea...
This paper analyzes the security of an IBE scheme proposed by Wang in 2007. It is shown that under BDHP (which is polynomially time equivalent to BIDHP) assumption the scheme is secure in random oracle model. Key-Words: Public Key Encryption, Identity-Based Encryption (IBE), One-Way Encryption (OWE), One-Way Identity-Based Encryption (ID-OWE).
Though cloud databases offer advantages in terms of maintenance cost, they require encryption in order to protect confidential records. Specialized searchable encryption schemes are needed to provide the functionality of privacy preserving search on encrypted data. In many use cases, a search which also returns the correct documents when the search term was misspelled is very desirable. Therefo...
With the rapid development of information technology, security images has emerged as a significant area research. This study presents an algorithm that integrates chaotic image encryption and convolutional neural network (CNN) to enhance efficiency. The applies properties randomness nonlinear mapping sequences with advanced feature extraction capabilities CNN model achieve robust encryption. Fi...
A model by which information technology services being delivered is resources are retrieved from the internet through web-based tools and applications, instead of direct connection to a server. The Data and software packages are stored in servers. However, cloud computing structure allows access to information as long as an electronic device has access to the web. In this technology users have ...
The focus of this lecture is efficient public-key encryption. In the previous lecture, we discussed a public-key encryption scheme for 1-bit messages. However, to encrypt an `-bit message, we can simply encrypt ` one-bit messages and send these (and we proved last time that this remains secure in the case of public-key encryption). Here, we first describe (briefly) how to combine public and pri...
As more criminals use encryption to conceal incriminating evidence, forensic examiners require practical methods for recovering some or all of the encrypted data. This paper presents lessons learned from investigations involving encryption in various contexts. By presenting successful and unsuccessful case examples, this paper gives forensic examiners a clearer understanding of the feasibility ...
In this paper, we propose a notion of threshold tag-based encryption schemes that simplifies the notion of threshold identity-based encryption schemes, and we show a conversion from any stag-CCAsecure threshold tag-based encryption schemes to CCA-secure threshold public-key encryption schemes. Moreover, we give two concrete constructions of stag-CCA-secure threshold tag-based encryption schemes...
Certificate-based encryption is a useful primitive that combines traditional public key encryption and identity-based encryption while preserving some of their most attractive features. It not only simplifies the cumbersome certificate management in traditional PKI, but also solves the key escrow problem inherent in identity-based encryption. In this paper, we propose a new certificate-based en...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید