نتایج جستجو برای: encryption

تعداد نتایج: 27368  

Journal: :J. Internet Serv. Inf. Secur. 2016
Chunlu Chen Hiroaki Anada Junpei Kawamoto Kouichi Sakurai

Internet service has enabled digital contents to be shared faster and easier, but on the other side it raised an issue of illegal copy of the digital contents. Public key encryption schemes solve this issue partially. However, there is still a weak point that the secret key is not completely protected; that is, public key encryption schemes suffer from illegal copy of secret keys (the key-cloni...

2012
Amril Syalim Takashi Nishide Kouichi Sakurai

Proxy re-encryption is a useful concept and many proxy reencryption schemes have been proposed in the asymmetric encryption setting. In the asymmetric encryption setting, proxy re-encryption can be beautifully implemented because many operations are available to directly transform a cipher to another cipher without the proxy needs to access the plaintexts. However, in many situations, for a bet...

2012
Sergey Gorbunov

Functional Encryption: Constructions and Lower Bounds Sergey Gorbunov Master of Science Graduate Department of Computer Science University of Toronto 2012 Functional encryption is an emerging paradigm for public-key encryption that enables finegrained control of access to encrypted data. Given a secret key for a circuit C and an encryption of an input message x, a user should be able to learn t...

2014
Daniel Luchaup Kevin P. Dyer Somesh Jha Thomas Ristenpart Thomas Shrimpton

Encryption schemes where the ciphertext must abide by a specified format have diverse applications, ranging from in-place encryption in databases to per-message encryption of network traffic for censorship circumvention. Despite this, a unifying framework for deploying such encryption schemes has not been developed. One consequence of this is that current schemes are ad-hoc; another is a requir...

Journal: :IACR Cryptology ePrint Archive 2015
Nathan Chenette Kevin Lewi Stephen A. Weis David J. Wu

In an order-preserving encryption scheme, the encryption algorithm produces ciphertexts that preserve the order of their plaintexts. Order-preserving encryption schemes have been studied intensely in the last decade, and yet not much is known about the security of these schemes. Very recently, Boneh et al. (Eurocrypt 2015) introduced a generalization of order-preserving encryption, called order...

2014
Dana Dachman-Soled

The primitive of deniable encryption was introduced by Canetti et al. (CRYPTO, 1997). Deniable encryption is an encryption scheme with the added feature that after transmitting a message m, both sender and receiver may produce random coins showing that the transmitted ciphertext was an encryption of any message m′ in the message space. Deniable encryption is a key tool for constructing incoerci...

2017
Bahram Javidi Artur Carnicer Masahiro Yamaguchi Takanori Nomura Elisabet Pérez-Cabré María S Millán Naveen K. Nishchal R Torroba John Fredy Barrera Wenqi He Xiang Peng Adrian Stern Yair Rivenson A Alfalou C Brosseau Changliang Guo John T Sheridan Guohai Situ M Naruse T Matsumoto Ignasi Juvells Enrique Tajahuerce Jesús Lancis Wen Chen Xudong Chen Pepijn W H Pinkse Allard P Mosk Adam Markman

Information security and authentication are important challenges facing our society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and developments of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information s...

2004
Dan Boneh Jonathan Katz

Recently, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure encryption schemes from identity-based encryption schemes in the standard model. We improve the efficiency of their construction, and show two specific instantiations of our resulting scheme which offer the most efficient encryption (and, in one case, key generation) of any CCA-secure encryption scheme to date.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید