نتایج جستجو برای: encryption

تعداد نتایج: 27368  

Journal: :IACR Cryptology ePrint Archive 2013
Pratik Sarkar

Ecash is a concept of electronic cash which would allow users to carry money in form of digital coins. Transaction can be done both offline and online in absence of a third party/financial institution. This paper proposes an offline model which supports multiple usage of transferable ecoin. The protocol is based on RSA, digital signature and a two-step encryption process. In this two step encry...

2015
Lovepreet Kaur Manish Mahajan

This paper presents a survey on the cloud security techniques using the encryption algorithm. The use of appropriate encryption algorithm increases the level of security in the cloud applications. The use of the encryption algorithm has been taken into account for this survey. This survey is based upon the recent cloud security solutions based upon the encryption algorithms. The use of unsecure...

2012
Sergey Gorbunov Vinod Vaikuntanathan Hoeteck Wee

We construct functional encryption schemes for polynomialtime computable functions secure against an a-priori bounded polynomial number of collusions. Our constructions require only semantically secure public-key encryption schemes and pseudorandom generators computable by small-depth circuits (known to be implied by most concrete intractability assumptions). For certain special cases such as p...

2003
Tom Lookabaugh Douglas C. Sicker David M. Keaton Wang Ye Guo Indrani Vedula

Selective encryption exploits the relationship between encryption and compression to reduce encryption requirements, saving in complexity and facilitating new system functionality. Selective encryption of MPEG video streams has been proposed in a number of variations, yet has seen little application to date. Here we focus on high encryption savings, targeting 10% of the bit stream or less encry...

Journal: :JNW 2010
Bo Meng JiangQing Wang

Deniable encryption is an important cryptographic primitive, essential in all cryptographic protocols where a coercive adversary comes to play with high potential. Deniable encryption plays a key role in the internet/electronic voting, electronic bidding, electronic auctions and secure multiparty computation. In this study a practical efficient receiver deniable encryption scheme based on BCP c...

Journal: :J. Mathematical Cryptology 2012
Nuttapong Attrapadung Benoît Libert

In functional encryption (FE) schemes, ciphertexts and private keys are associated with attributes and decryption is possible whenever key and ciphertext attributes are suitably related. It is known that expressive realizations can be obtained from a simple functional encryption flavor called inner product encryption (IPE), where decryption is allowed whenever ciphertext and key attributes form...

2013
Stefano Tessaro David A. Wilson

Following up on its first construction by Gentry (STOC 2009), fully-homomorphic encryption (FHE) has generated a multitude of different works, seeking both for new theoretical approaches as well as for more efficient instantiations. All existing FHE schemes, however, are tightly connected to specific assumptions, and no generic constructions are known. In this paper, we investigate generic cons...

2013
Felix Büsching Andreas Figur Dominik Schürmann Lars Wolf

Encryption is essential in many WSN applications. Several encryption frameworks exist which are mostly based on software algorithms. However, nearly every up-to-date radio transceiver chip is equipped with an integrated hardware encryption engine. With this Poster we show the benefits of utilizing an integrated hardware encryption engine in comparison to pure software-based solutions.

2014
S Aparna Devi Dath

Enforcing privacy on public clouds through access control mechanisms are currently based on Single Layer Encryption. Under Single Layer Encryption, data owners should upload data on the cloud after encrypting them and have to re-encrypt the data whenever access policies or user profiles are changed. This could increase the communication and computational costs at data owners. A better approach ...

Journal: :Advances in Electrical and Computer Engineering 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید