نتایج جستجو برای: elgamal

تعداد نتایج: 569  

Journal: :Journal of Computer Science 2023

The rapid development of digital data sharing has made information security a crucial concern in communication. system heavily relies on encryption methods. These algorithms employ strategies to increase secrecy and privacy by obscuring the information, which only those parties who have accompanying key can decode or decrypt. Nevertheless, these methods also use lot computational resources, inc...

Journal: :International Journal of Security and Its Applications 2018

1996
Hossein Ghodosi Josef Pieprzyk Chris Charnes Reihaneh Safavi-Naini

This paper addresses the problem of information protection in hierarchical groups. Higher level groups of participants can control the information ow (the decryption ability) to lower level groups. If a higher level group decides to allow a lower level group to read the message, it passes a go ahead ticket so the lower level group can decrypt the cryptogram and read the message. The formal mode...

Journal: :IEICE Transactions 2005
Jun Furukawa

In this paper, we propose an efficient protocol for proving the correctness of shuffling and an efficient protocol for simultaneously proving the correctness of both shuffling and decryption. The former protocol is the most efficient in computational and communication complexity among 3-move honest verifier perfect zero-knowledge protocols for proving a shuffling of ElGamal cipher-texts. The la...

Journal: :IACR Cryptology ePrint Archive 2016
Sumit Kumar Debnath Ratna Dutta

In this paper, we propose a construction of fair and efficient mutual Private Set Intersection (mPSI) with linear communication and computation complexities, where the underlying group is of prime order. The main tools in our approach include: (i) ElGamal and Distributed ElGamal Cryptosystems as multiplicatively Homomorphic encryptions, (ii) Cramer-Shoup Cryptosystem as Verifiable encryption. O...

1994
Patrick Horster Markus Michels Holger Petersen

Limited distribution notes: This report has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher its distribution outside the University of Technology Chemnitz-Zwickau prior to publication should be limited to peer communications and speciic requests. After outside publication, requests should be lled only by rep...

Journal: :IACR Cryptology ePrint Archive 2006
Goichiro Hanaoka Hideki Imai

In this paper, we propose a generic construction of chosen-ciphertext secure cryptosystems against adversaries with a bounded number of decrytion queries from arbitrary semantically secure encryption in a black box manner. Our construction is not only an alternative to the previously known technique, i.e. the Naor-Yung paradigm [37, 19, 42], but also has some interesting properties. Especially,...

Journal: :IACR Cryptology ePrint Archive 2008
Ayan Mahalanobis

The MOR cryptosystem is a generalization of the ElGamal cryptosystem, where the discrete logarithm problem works in the automorphism group of a group G, instead of the group G itself. The framework for the MOR cryptosystem was first proposed by Paeng et al. [13]. Mahalanobis [10] used the group of unitriangular matrices for the MOR cryptosystem. That effort was successful: the MOR cryptosystem ...

Journal: :IACR Cryptology ePrint Archive 2017
Guilhem Castagnos Laurent Imbert Fabien Laguillaumie

At CRYPTO 2016, Couteau, Peters and Pointcheval introduced a new primitive called encryption switching protocols, allowing to switch ciphertexts between two encryption schemes. If such an ESP is built with two schemes that are respectively additively and multiplicatively homomorphic, it naturally gives rise to a secure 2-party computation protocol. It is thus perfectly suited for evaluating fun...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید