نتایج جستجو برای: encryption
تعداد نتایج: 27368 فیلتر نتایج به سال:
Ecash is a concept of electronic cash which would allow users to carry money in form of digital coins. Transaction can be done both offline and online in absence of a third party/financial institution. This paper proposes an offline model which supports multiple usage of transferable ecoin. The protocol is based on RSA, digital signature and a two-step encryption process. In this two step encry...
This paper presents a survey on the cloud security techniques using the encryption algorithm. The use of appropriate encryption algorithm increases the level of security in the cloud applications. The use of the encryption algorithm has been taken into account for this survey. This survey is based upon the recent cloud security solutions based upon the encryption algorithms. The use of unsecure...
We construct functional encryption schemes for polynomialtime computable functions secure against an a-priori bounded polynomial number of collusions. Our constructions require only semantically secure public-key encryption schemes and pseudorandom generators computable by small-depth circuits (known to be implied by most concrete intractability assumptions). For certain special cases such as p...
Selective encryption exploits the relationship between encryption and compression to reduce encryption requirements, saving in complexity and facilitating new system functionality. Selective encryption of MPEG video streams has been proposed in a number of variations, yet has seen little application to date. Here we focus on high encryption savings, targeting 10% of the bit stream or less encry...
Deniable encryption is an important cryptographic primitive, essential in all cryptographic protocols where a coercive adversary comes to play with high potential. Deniable encryption plays a key role in the internet/electronic voting, electronic bidding, electronic auctions and secure multiparty computation. In this study a practical efficient receiver deniable encryption scheme based on BCP c...
In functional encryption (FE) schemes, ciphertexts and private keys are associated with attributes and decryption is possible whenever key and ciphertext attributes are suitably related. It is known that expressive realizations can be obtained from a simple functional encryption flavor called inner product encryption (IPE), where decryption is allowed whenever ciphertext and key attributes form...
Obfuscating Many-to-one Functional Re-encryption, and its Connection to Fully-Homomorphic Encryption
Following up on its first construction by Gentry (STOC 2009), fully-homomorphic encryption (FHE) has generated a multitude of different works, seeking both for new theoretical approaches as well as for more efficient instantiations. All existing FHE schemes, however, are tightly connected to specific assumptions, and no generic constructions are known. In this paper, we investigate generic cons...
Encryption is essential in many WSN applications. Several encryption frameworks exist which are mostly based on software algorithms. However, nearly every up-to-date radio transceiver chip is equipped with an integrated hardware encryption engine. With this Poster we show the benefits of utilizing an integrated hardware encryption engine in comparison to pure software-based solutions.
Enforcing privacy on public clouds through access control mechanisms are currently based on Single Layer Encryption. Under Single Layer Encryption, data owners should upload data on the cloud after encrypting them and have to re-encrypt the data whenever access policies or user profiles are changed. This could increase the communication and computational costs at data owners. A better approach ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید