Double-Server Open-Key Encryption
نویسندگان
چکیده
منابع مشابه
Secure Encryption scheme with key exchange for Two server Architecture
In Distributed environment authentication and keyexchange mechanisms plays a major role. Generally in authentication a client and server agree upon a cryptographic key which is mutually exchanged. Earlier passwords were stored in a single server where if an intruder gains access of that server by some malicious attacks then all the passwords stored in the database are to be compromised and ther...
متن کاملKey-space analysis of double random phase encryption technique.
We perform a numerical analysis on the double random phase encryption/decryption technique. The key-space of an encryption technique is the set of possible keys that can be used to encode data using that technique. In the case of a strong encryption scheme, many keys must be tried in any brute-force attack on that technique. Traditionally, designers of optical image encryption systems demonstra...
متن کاملPublic-key Encryption with Masking Public-key Encryption with Masking
Timed-release encryption, first mentioned by May [12] and discussed by Rivest, Shamir, and Wanger [15], is a cryptographic primitive which enables us to “send a message into the future.” We take a simple approach, called public-key encryption with masking, in order to realize this requirement. In our model, the sender first encrypts a plaintext and “masks” the ciphertext, then send it the recei...
متن کاملPublic Key Encryption and Encryption Emulation Attacks
The main purpose of this paper is to show that public key encryption can be secure against the “encryption emulation” attack (on the sender’s encryption) by computationally unbounded adversary, with one reservation: a legitimate receiver decrypts correctly with probability that can be made arbitrarily close to 1, but not equal to 1. 1. Summary of our claims We thought it would make sense to sum...
متن کاملHuman Public-Key Encryption
This paper proposes a public-key cryptosystem and a short password encryption mode, where traditional hardness assumptions are replaced by specific refinements of the CAPTCHA concept called Decisional and Existential CAPTCHAs. The public-key encryption method, achieving 128-bit security, typically requires from the sender to solve one CAPTCHA. The receiver does not need to resort to any human a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology
سال: 2019
ISSN: 2321-9653
DOI: 10.22214/ijraset.2019.7218