نتایج جستجو برای: decryption

تعداد نتایج: 3453  

2006
John Bethencourt Hubert Chan Adrian Perrig Elaine Shi Dawn Song

We introduce the concept of Anonymous Multi-Attribute Encryption with Range Query and Conditional Decryption (AMERQCD). In AMERQCD, a plaintext is encrypted under a point in multidimensional space. To a computationally bounded adversary, the ciphertext hides both the plaintext and the point under which it is encrypted. In a range query, a master key owner releases the decryption key for an arbi...

2016
Lixian Liu Guowei Wu

In order to improve the efficiency of attribute based encryption, according to the work of Li etal. [17] , a new technique is adopted to implement the revocation of attribute-based encryption. Based on the work of Green etal.[16], a ciphertext attribute based encryption (CP-ABE) scheme with outsourced revocation and decryption simultaneously is proposed. After outsourcing complex computation in...

Journal: :Computer Communications 2007
Ala I. Al-Fuqaha Omar Al-Ibrahim Ammar Rayes

We propose a geo-encryption protocol that allows mobile nodes to communicate securely by restricting the decryption of a message to a particular location and time period. Our protocol will handle the exchange of movement parameters, so that a sender is able to geoencrypt messages to a moving decryption zone that contains a mobile node’s estimated location. We also present methods for estimating...

2012

Introduction Data encryption and decryption operations are basic building blocks for most security applications. For this purpose, most systems use block ciphers, such as the public AES standard. It is well known, however, that implementations of block ciphers such as AES, as well as other cryptographic algorithms, are subject to side-channel attacks [1]. These attacks allow adversaries to extr...

Journal: :J. Inf. Sci. Eng. 2010
Shu-Hui Chang Chuan-Ming Li Tzonelih Hwang

This paper presents an identity-based hierarchical designated decryption (IHDD) scheme which allows a message sender to generate ciphertexts that can be decrypted by (1) only a specified recipient or (2) a specified recipient and all or some of its ancestor users in the hierarchy tree. The newly proposed scheme can be considered as a combination of the hierarchical identity-based encryption (HI...

2017
Zhongmin DAI

Recent years have seen a pervasive usage of mobile-based instant messaging apps, which are popularly known as chat apps. On users’ mobile devices, chat logs are usually stored encrypted. This paper is concerned with discovering the decryption key of chat-log database files as they are used by popular chat apps like WhatsApp andWeChat. We propose a systematic and generalized information-flow bas...

2009
Jeongdae Hong Jinil Kim Jihye Kim Matthew K. Franklin Kunsoo Park

A threshold decryption scheme is a multi-party public key cryptosystem that allows any sufficiently large subset of participants to decrypt a ciphertext, but disallows the decryption otherwise. Many threshold cryptographic schemes have been proposed so far, but fairness is not generally considered in this earlier work. In this paper, we present fair threshold decryption schemes, where either al...

2012
Yumnam Kirani Singh

A generalized way of Vigenere cipher is proposed. Instead of using a Vigenere square for encryption and decryption, any two reversible square matrices whose rows or columns are unique are used for encryption and decryption purpose. One matrix can be easily obtained from the other and hence any one of them can be used for encryption while the other can be derived from the other for decryption. T...

2011
Bingsheng Zhang

During an adaptive oblivious transfer (OT), a sender has n private documents, and a receiver can adaptively fetch k documents from them such that the sender learns nothing about the receiver’s selection and the receiver learns nothing more than those k documents. Most recent fully simulatable adaptive OT schemes are based on so-called “assisted decryption” or “blind decryption”. In this paper, ...

Journal: :IACR Cryptology ePrint Archive 2008
Varad Kirtane C. Pandu Rangan

Multi-Power RSA [1] is a fast variant of RSA [2] with a small decryption time, making it attractive for implementation on lightweight cryptographic devices such as smart cards. Hensel Lifting is a key component in the implementation of fast Multi-Power RSA Decryption. However, it is found that a näıve implementation of this algorithm is vulnerable to a host of side channel attacks, some of them...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید