نتایج جستجو برای: decryption

تعداد نتایج: 3453  

Journal: :IACR Cryptology ePrint Archive 2014
Zhen Liu Zhenfu Cao Duncan S. Wong

Recently a series of expressive, secure and efficient Attribute-Based Encryption (ABE) schemes, both in key-policy flavor and ciphertext-policy flavor, have been proposed. However, before being applied into practice, these systems have to attain traceability of malicious users. As the decryption privilege of a decryption key in Key-Policy ABE (resp. Ciphertext-Policy ABE) may be shared by multi...

2015

Speech encoding and encryption in VLSI, Published by ACM.Abstract In this paper, an image encryptiondecryption algorithm and its VLSI architecture are proposed. Fourier-Transform Based Speech Encryption.AbstractThis paper proposes a hardware-based speech. Public-key cryptography, the two keys are called the private key and. The VLSI implementation is.International journal of VLSI design Communi...

Journal: :Computers & Security 2021

Ransomware is a type of malware that locks out its victim’s access to their devices or data – typically by encrypting files and demands payment in exchange restoring access. To fight the increasing threat posed ransomware, security researchers practitioners have developed decryption tools. These aim help victims recovering data, generally decrypting compromised without paying ransom. Unfortunat...

2006
Jae-Pyo Park Moon-Seog Jun

In this paper we first propose an encryption scheme for encryption of MPEG video data using PKI, second, we propose a shared key pool and encryption/decryption of multimedia data. Third, to reduce huge play-out delay time which occurs when performing decryption on large capacity multimedia data, a double buffer configuration is adopted and a real-time decryption scheme using efficient buffer sc...

Journal: :J. Inf. Sci. Eng. 2016
Zhan-Jun Wang Hai-Ying Ma Jin-Hua Wang

Attribute-based encryption (ABE) is a promising encryption for fine-grained sharing of ciphertext based on users’ attributes. One drawback of ABE is that the encryption and decryption computational costs grow with the number of attributes and the complexity of the access policy. In scenarios where mobile devices are required, it will make encryption and decryption a possible bottleneck for thes...

Journal: :Blood advances 2017
Shabbir A Ansari Usha R Pendurthi L Vijaya Mohan Rao

Many pathophysiologic agents transform cryptic tissue factor (TF) on cells to prothrombotic TF, and one such stimulus is 4-hydroxy-2-nonenal (HNE), the most abundant aldehyde produced by the oxidation of ω-6 polyunsaturated fatty acids. HNE was shown to induce reactive oxygen species (ROS) generation and p38 MAPK activation, but the link between them and their role in TF decryption are unclear....

2015
Jeffrey Finkelstein

A time-lock puzzle is merely an encryption scheme that has no secret key. The secret key in an encryption scheme is intended to allow efficient decryption only for the holder of the key. If the sender wishes the receiver to be the only receiver of the message, he or she should use a secure encryption scheme on top of the time-lock puzzle. In a time-lock puzzle, “efficient” decryption (in a cert...

2013
Vidhi Agarwal Raj Yadav

In cloud computing, the data will be stored in storage provided by CSP.Service providers must have a viable way to protect their user’s data, especially to prevent the data from disclosure by Malicious Insiders. Storing the data in encrypted form is a popular and common method of protecting user’s data . If a cloud is responsible for storage and encryption/decryption of data, then Malicious Ins...

1999
Michael Hartmann Sachar Paulus Tsuyoshi Takagi

Recently, a new public-key cryptosystem constructed on number elds is presented. The prominent theoretical property of the public-key cryptosystem is a quadratic decryption bit complexity of the public key, which consists of only simple fast arithmetical operations. We call the cryptosystem NICE (New Ideal Coset Encryption). In this paper, we consider practical aspects of the NICE cryptosystem....

Journal: :IACR Cryptology ePrint Archive 2009
So-Young Park Sang-Ho Lee Joohan Lee

We newly propose a multiple and unlinkable identity-based public key encryption scheme. Unlike the traditional public key encryption and identity-based encryption schemes, our scheme allows the use of a various number of identity-based public keys in different groups or applications while keeping a single decryption key so that the decryption key can decrypt every ciphertexts encrypted with tho...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید