Showing 281 - 300 results of 378 for search '"Cryptography"', query time: 0.04s Refine Results
  1. 281

    (t, n) threshold secret sharing scheme without SDC by ZHOU Fu-cai, LIN Long, WANG Jin-ying, XU Jian

    Published 2006-01-01
    “…By means of the intractability of ellipse curve discrete logarithm problem(ECDLP),a(t,n) secret sharing threshold scheme based on ellipse curve cryptography was proposed.Generally speaking,there are two kinds of threshold schemes: a threshold scheme with share distribution center(SDC) and a threshold scheme without SDC.Under distrib-uted situation,there is no such a center can be completely trusted by all members of the group,a threshold scheme with-out SDC appears more attractive.In the scheme without SDC all of the members generate the group public key and pri-vate keys.When new numbers join the group secret sharing should be updated by period.An example of the scheme us-ing the small number was given.The security of the scheme was analyzed in the final.…”
    Get full text
    Article
  2. 282

    An Image Sharing Encryption Management System For Kabale University. by Bemera, Rauben

    Published 2024
    “…Myriad methods of protection are used ranging from a simple authentication password to most complex cryptography or Steganography algorithms for hiding the extremely sensitive data. …”
    Get full text
    Thesis
  3. 283

    Pengamanan Citra Digital Menggunakan Kriptografi DnaDan Modified LSB by Sabrina Adela Br Sibarani, Andreas Munthe, Ronsen Purba, Ali Akbar Lubis

    Published 2024-12-01
    “…Abstract Digital image encryption using DNA Cryptography combines computational science with biological principles to provide dual security. …”
    Get full text
    Article
  4. 284

    Supply chain dynamic multi-center coordination authentication model based on block chain by Jian-ming ZHU, Yong-gui FU

    Published 2016-01-01
    “…The research results have proposed a new idea for the application of cryptography and block chain.…”
    Get full text
    Article
  5. 285

    Enhanced cloud storage access control scheme based on attribute by De-hua NIU, Jian-feng MA, Zhuo MA, Chen-nan LI, Lei WANG

    Published 2013-08-01
    “…Considering the efficiency of ABE is very low when it is used to a large amount of data, symmetric cryptography was used to ensure the confidentiality of the vast amounts of sensitive data while ABE was used to protect the small number of symmetric keys. …”
    Get full text
    Article
  6. 286

    Breaking the Blockchain Trilemma: A Comprehensive Consensus Mechanism for Ensuring Security, Scalability, and Decentralization by Khandakar Md Shafin, Saha Reno

    Published 2024-01-01
    “…Employing established techniques such as elliptic curve cryptography, Schnorr verifiable random function, and zero-knowledge proof (zk-SNARK), alongside groundbreaking methodologies for stake distribution, anomaly detection, and incentive alignment, our framework sets a new benchmark for secure, scalable, and decentralized blockchain ecosystems. …”
    Get full text
    Article
  7. 287

    Exploration and practice of PRIDE teaching mode oriented to cybersecurity talent cultivation by Jianwei LIU, Dawei LI, Ying GAO, Yu SUN, Hua GUO

    Published 2021-08-01
    “…In the long-term practice of cybersecurity talent cultivation, the teaching team of School of Cyber Science and Technology of Beihang University, aiming at the knowledge goal, ability goal and quality goal of talent cultivation of cybersecurity discipline and related majors, puts forward the innovative teaching idea of “fine teaching, strong practice, excellent assessment, abundant resources” according to the knowledge characteristics, thinking characteristics and psychological characteristics of students.The teaching team integrates political teaching,research teaching, inspiration teaching, seminar teaching and example teaching methods, puts forward the PRIDE teaching mode,which has been widely applied in the teaching of core professional courses such as “Information Network Security” and “Modern Cryptography”, and has got remarkable teaching achievement.Through the practice of PRIDE teaching mode, a high-level teaching team with high political quality and strong teaching ability has been also built.…”
    Get full text
    Article
  8. 288

    Cryptomite: A versatile and user-friendly library of randomness extractors by Cameron Foreman, Richie Yeung, Alec Edgington, Florian J. Curchod

    Published 2025-01-01
    “…Contrary to alternatives using the fast Fourier transform, we implement convolutions efficiently using the number-theoretic transform to avoid rounding errors, making them well suited to cryptography. The algorithms and parameter calculation are described in detail, including illustrative code examples and performance benchmarking.…”
    Get full text
    Article
  9. 289

    Lattice-based provable data possession in the standard model for cloud-based smart grid data management systems by Caixue Zhou, Lihua Wang, Lingmin Wang

    Published 2022-04-01
    “…With the development of quantum computer technology, quantum attacks-resistant cryptographic schemes are gradually entering people’s horizons. Lattice cryptography can resist quantum attacks. In this article, a lattice-based provable data possession scheme is proposed for cloud-based smart grid data management systems. …”
    Get full text
    Article
  10. 290

    Revisiting Sum of Residues Modular Multiplication by Yinan Kong, Braden Phillips

    Published 2010-01-01
    “…In the 1980s, when the introduction of public key cryptography spurred interest in modular multiplication, many implementations performed modular multiplication using a sum of residues. …”
    Get full text
    Article
  11. 291

    Elliptic curve ElGamal encryption based location privacy-preserving scheme by Huibin LAI, Li XU, Yali ZENG, Rui ZHU

    Published 2020-06-01
    “…An elliptic curve ElGamal encryption based location privacy-preserving scheme was proposed to address the location privacy problem of secondary users in collaborative spectrum sensing.Firstly,secondary users encrypted the original sensing reports using the ElGamal public key techniques on the elliptic curve and sent them to the trusted property authority.Secondly,the trusted property authority partially decrypted and randomized sensing reports and then sent the randomized sensing reports to the fusion center.Thirdly,the fusion center finally decrypted and got the original sensing reports.Finally,security of the scheme was analyzed.According to the scheme,the encryption method of sensing reports was based on public key cryptography on elliptic curve.And the trusted property authority randomized encrypted sensing reports.Thus the location privacy of secondary users can be protected.Meanwhile,this scheme effectively reduces communication and storage cost,compared with other schemes.In addition,this scheme also has fault tolerant and dynamic mechanism,which increases the practicability and feasibility.…”
    Get full text
    Article
  12. 292

    A new cryptosystem based on an enhanced Vigenere cipher incorporating large SBoxes by Chemlal Abdelhakim, Tabti Hassan, El Bourakkadi Hamid, Abid Abdellah, Jarjar Abdellatif, Benazzi Abdelhamid

    Published 2025-01-01
    “…This technique relies on a significant enhancement of the conventional Vigenere method, incorporating the implementation of two large substitution tables generated from the widely used chaotic maps in cryptography. The system integrates new confusion/diffusion functions, governed by binary decision vectors of pseudorandom values. …”
    Get full text
    Article
  13. 293

    Privacy-preserving multi-attribute reverse spectrum auction scheme by Jiaqi WANG, Ning LU, Qingfeng CHENG, Zhaoxia WU, Wenbo SHI

    Published 2020-09-01
    “…Aiming the problem that the existing reverse spectrum auctions do not take the non-price attribute of spectrum into account and the security of spectrum auction,a privacy-preserving multi-attribute reverse spectrum auction was proposed.Firstly,price and non-price positive attributes of spectrum were considered as the bidding scheme of bidders and auctions was performed to judge spectrum winners.Secondly,to ensure the security of the spectrum auction,the Paillier threshold system was used to introduce a group of spectrum auction servers of auctioneers to replace the traditional single third-party agency,which could prevent the fraud collusion between spectrum auctioneers and bidders.The cryptography tools such as the anonymization technology and oblivious transfer were introduced to achieve the secure features,which could make the spectrum auction performed securely.The security analysis shows that the security protocol has strong security.The performance of the protocol is also evaluated,and experimental results show that the security scheme is superior to the multi-attribute reverse auction security scheme that can be applied in the spectrum auction scenario in terms of computational overhead.…”
    Get full text
    Article
  14. 294

    Efficient and provably secure attribute-based online/offline encryption schemes by Hai-ying MA, Guo-sun ZENG, GZhan-jun WAN, Wei WANG

    Published 2014-07-01
    “…To improve the encryption efficiency, the online/offline cryptography was extended to ABE and the primitive of attribute-based online/offline encryption (ABOOE) was proposed. …”
    Get full text
    Article
  15. 295

    Bit-Sliced Implementation of SM4 and New Performance Records by Xin Miao, Lu Li, Chun Guo, Meiqin Wang, Weijia Wang

    Published 2023-01-01
    “…SM4 is a popular block cipher issued by the Office of State Commercial Cryptography Administration (OSCCA) of China. In this paper, we use the bit-slicing technique that has been shown as a powerful strategy to achieve very fast software implementations of SM4. …”
    Get full text
    Article
  16. 296

    A Survey of Research Progress and Development Tendency of Attribute-Based Encryption by Liaojun Pang, Jie Yang, Zhengtao Jiang

    Published 2014-01-01
    “…With the development of cryptography, the attribute-based encryption (ABE) draws widespread attention of the researchers in recent years. …”
    Get full text
    Article
  17. 297

    Efficient revocable certificateless remote anonymous authentication protocol for wireless body area network by Shun ZHANG, Hongli FAN, Hong ZHONG, Miaomiao TIAN

    Published 2018-04-01
    “…To ensure the security and privacy of patients’ health data in wireless body area network (WBAN),communication parties must be mutual authenticated.Now some bilinear pairings led to a larger computation cost for users and tree structure revocation would lead to larger user storage cost.In order to achieve revocation and reduce the cost of the user side,a novel revocable certificate less remote anonymous authentication protocol for WBAN was proposed by using elliptic curve cryptography and revoke algorithm that could revoke users by updating their time-private-keys.Security requirements including anonymity,mutual authentication and session key establishment were satisfied in proposed scheme.Compared with the existing schemes,the experimental analysis shows that the computation cost and storage cost of the authentication protocol are greatly reduced,which is more suitable for resource-constrained WBAN.Security analysis also shows that the protocol is secure in the random oracle model.…”
    Get full text
    Article
  18. 298
  19. 299

    Eigenvalues of Relatively Prime Graphs Connected with Finite Quasigroups by Muhammad Nadeem, Nwazish Ali, Hafiz Muhammad Bilal, Md. Ashraful Alam, M. I. Elashiry, Kholood Alnefaie

    Published 2024-01-01
    “…Spectral graph theory plays a very important role in understanding certifiable applications such as cryptography, combinatorial design, and coding theory. …”
    Get full text
    Article
  20. 300

    Comparative Study of Generalized Quantitative-Qualitative Inaccuracy Fuzzy Measures for Noiseless Coding Theorem and 1:1 Codes by H. D. Arora, Anjali Dhiman

    Published 2015-01-01
    “…In coding theory, we study various properties of codes for application in data compression, cryptography, error correction, and network coding. The study of codes is introduced in Information Theory, electrical engineering, mathematics, and computer sciences for the transmission of data through reliable and efficient methods. …”
    Get full text
    Article