نتایج جستجو برای: encryption

تعداد نتایج: 27368  

Journal: :Int. Arab J. Inf. Technol. 2013
Ayman Mousa Osama S. Faragallah S. El-Rabaie Elsayed Nigm

Database encryption is a well established technology for protecting sensitive data. Unfortunately, the integration of existing encryption techniques with database systems causes undesirable performance degradation. It is a crucial technique in the security mechanisms of database. In this paper we propose a new encryption algorithm, which we call Reverse Encryption Algorithm (REA). Our new encry...

2009
Alexander W. Dent

Certificateless encryption is a form of public-key encryption that is designed to eliminate the disadvantages of both traditional PKIbased public-key encryption scheme and identity-based encryption. Unlike public-key encryption, there is no requirement for digital certificates or a public-key infrastructure. Unlike identity-based encryption, the trusted third party need not be given the ability...

2013
Jian Liu

Homomorphic encryption enables computations on encrypted data. This property makes such encryption schemes useful in a wide variety of privacy preserving applications. This paper provides a brief survey on the homomorphic encryption. We describe the homomorphic cryptosystems from partially homomorphic encryption to fully homomorphic encryption. We also give some security analysis and describe h...

Journal: :IACR Cryptology ePrint Archive 2008
Xu An Wang Xiaoyuan Yang Fagen Li

In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy re-encryption[3]. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice’s public key into one that can be opened under Bob’s decryption key. In 2007, Matsuo proposed the concept of four types of proxy re-encryption schemes: CBE(Certificate Based Public Key Encryption) to IBE(Id...

Journal: :International Journal of Computer Applications 2014

Journal: :TELKOMNIKA (Telecommunication Computing Electronics and Control) 2012

Journal: :Mathematics 2023

The widespread adoption of cloud infrastructures has revolutionized data storage and access. However, it also raised concerns regarding the privacy sensitive data. To address these concerns, encryption techniques have been widely used. traditional schemes limit efficient search retrieval encrypted tackle this challenge, innovative approaches emerged, such as utilization Homomorphic Encryption (...

Journal: :Asia-pacific Journal of Convergent Research Interchange 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید