Efficient Protocols based on Probabilistic Encryption using Composite Degree Residue Classes

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Public-Key Cryptosystems Based on Composite Degree Residuosity Classes

This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to public-key cryptography. We propose a new trapdoor mechanism and derive from this technique three encryption schemes: a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA. Our cryptosystems, based on usual modular...

متن کامل

Efficient Signal Encryption using Chaos-based System

Signal encryption algorithm based on the Chaotic system has been increasingly used, but the drawbacks of small key space, less security in low dimensional chaotic crypto systems, simple chaotic and inconvenient for hardware implementation, are obvious. This paper presents a new signal encryption algorithm based on higher dimensional electronic chaos with the simple electronic system. The attack...

متن کامل

Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption

This paper presents efficient secure auction protocols for first price auction and second price auction. Previous auction protocols are based on a generally secure multi-party protocol called mix-and-match protocol. However, the time complexity of the mix-and-match protocol is large, although it can securely calculate any logical circuits. The proposed protocols reduce the number of times the m...

متن کامل

Efficient hybrid encryption from ID-based encryption

This paper deals with generic transformations from ID-based key encapsulation mechanisms (IBKEM) to hybrid public-key encryption (PKE). The best generic transformation known until now is by Boneh and Katz and requires roughly 704-bit overhead in the ciphertext. We present two new such generic transformations that are applicable to partitioned IBKEMs. A partitioned IBKEM is an IBKEM that provide...

متن کامل

audio signal encryption based on permutation relations and residue number system

this paper presents a new audio encryption algorithm based on permutation and residue number system. in the current approach, signal samples are combined with residue number system through permutation; therefore, a specific noise is generated. then, the audio signal is combined with the noise, generated by the algorithm, to produce a silence signal. for this purpose, the algorithm uses a predef...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: BRICS Report Series

سال: 2000

ISSN: 1601-5355,0909-0878

DOI: 10.7146/brics.v7i5.20133