ElGamal-type encryption for optimal dynamic quantizer in encrypted control systems
نویسندگان
چکیده
منابع مشابه
Optimal Re-encryption Strategy for Joins in Encrypted Databases
In order to perform a join in a deterministically, adjustably encrypted database one has to re-encrypt at least one column. The problem is to select that column that will result in the minimum number of re-encryptions even under an unknown schedule of joins. Naive strategies may perform too many or even infinitely many re-encryptions. We provide two strategies that allow for a much better perfo...
متن کاملLeakage Resilient ElGamal Encryption
Blinding is a popular and well-known countermeasure to protect public-key cryptosystems against side-channel attacks. The high level idea is to randomize an exponentiation in order to prevent multiple measurements of the same operation on different data, as such measurements might allow the adversary to learn the secret exponent. Several variants of blinding have been proposed in the literature...
متن کاملAn Optimal Dynamic Control Method for an Isolated Intersection Using Fuzzy Systems
Traffic flow systems are nonlinear and uncertain, so it is very difficult to find their optimal points. In traditional traffic control systems, the traffic lights of crossings change in a fixed time period that is not optimal. On the other hand, most proposed systems are sufficiently capable of coping with the uncertainties of traffic flow. To solve this problem, there is a need to develop expe...
متن کاملEncoding-Free ElGamal-Type Encryption Schemes on Elliptic Curves
At PKC 2006, Chevallier-Mames, Paillier, and Pointcheval proposed a very elegant technique over cyclic subgroups of Fp eliminating the need to encode the message as a group element in the ElGamal encryption scheme. Unfortunately, it is unclear how to adapt their scheme over elliptic curves. In a previous attempt, Virat suggested an adaptation of ElGamal to elliptic curves over the ring of dual ...
متن کاملSecurity of Signed ElGamal Encryption
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against the adaptive chosen ciphertext attack, in which an attacker can freely use a decryption oracle except for the target ciphertext. We also prove security against the novel one-more-decyption attack. Our security proofs ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SICE Journal of Control, Measurement, and System Integration
سال: 2021
ISSN: 1882-4889,1884-9970
DOI: 10.1080/18824889.2021.1906016