-
281
(t, n) threshold secret sharing scheme without SDC
Published 2006-01-01“…By means of the intractability of ellipse curve discrete logarithm problem(ECDLP),a(t,n) secret sharing threshold scheme based on ellipse curve cryptography was proposed.Generally speaking,there are two kinds of threshold schemes: a threshold scheme with share distribution center(SDC) and a threshold scheme without SDC.Under distrib-uted situation,there is no such a center can be completely trusted by all members of the group,a threshold scheme with-out SDC appears more attractive.In the scheme without SDC all of the members generate the group public key and pri-vate keys.When new numbers join the group secret sharing should be updated by period.An example of the scheme us-ing the small number was given.The security of the scheme was analyzed in the final.…”
Get full text
Article -
282
An Image Sharing Encryption Management System For Kabale University.
Published 2024“…Myriad methods of protection are used ranging from a simple authentication password to most complex cryptography or Steganography algorithms for hiding the extremely sensitive data. …”
Get full text
Thesis -
283
Pengamanan Citra Digital Menggunakan Kriptografi DnaDan Modified LSB
Published 2024-12-01“…Abstract Digital image encryption using DNA Cryptography combines computational science with biological principles to provide dual security. …”
Get full text
Article -
284
Supply chain dynamic multi-center coordination authentication model based on block chain
Published 2016-01-01“…The research results have proposed a new idea for the application of cryptography and block chain.…”
Get full text
Article -
285
Enhanced cloud storage access control scheme based on attribute
Published 2013-08-01“…Considering the efficiency of ABE is very low when it is used to a large amount of data, symmetric cryptography was used to ensure the confidentiality of the vast amounts of sensitive data while ABE was used to protect the small number of symmetric keys. …”
Get full text
Article -
286
Breaking the Blockchain Trilemma: A Comprehensive Consensus Mechanism for Ensuring Security, Scalability, and Decentralization
Published 2024-01-01“…Employing established techniques such as elliptic curve cryptography, Schnorr verifiable random function, and zero-knowledge proof (zk-SNARK), alongside groundbreaking methodologies for stake distribution, anomaly detection, and incentive alignment, our framework sets a new benchmark for secure, scalable, and decentralized blockchain ecosystems. …”
Get full text
Article -
287
Exploration and practice of PRIDE teaching mode oriented to cybersecurity talent cultivation
Published 2021-08-01“…In the long-term practice of cybersecurity talent cultivation, the teaching team of School of Cyber Science and Technology of Beihang University, aiming at the knowledge goal, ability goal and quality goal of talent cultivation of cybersecurity discipline and related majors, puts forward the innovative teaching idea of “fine teaching, strong practice, excellent assessment, abundant resources” according to the knowledge characteristics, thinking characteristics and psychological characteristics of students.The teaching team integrates political teaching,research teaching, inspiration teaching, seminar teaching and example teaching methods, puts forward the PRIDE teaching mode,which has been widely applied in the teaching of core professional courses such as “Information Network Security” and “Modern Cryptography”, and has got remarkable teaching achievement.Through the practice of PRIDE teaching mode, a high-level teaching team with high political quality and strong teaching ability has been also built.…”
Get full text
Article -
288
Cryptomite: A versatile and user-friendly library of randomness extractors
Published 2025-01-01“…Contrary to alternatives using the fast Fourier transform, we implement convolutions efficiently using the number-theoretic transform to avoid rounding errors, making them well suited to cryptography. The algorithms and parameter calculation are described in detail, including illustrative code examples and performance benchmarking.…”
Get full text
Article -
289
Lattice-based provable data possession in the standard model for cloud-based smart grid data management systems
Published 2022-04-01“…With the development of quantum computer technology, quantum attacks-resistant cryptographic schemes are gradually entering people’s horizons. Lattice cryptography can resist quantum attacks. In this article, a lattice-based provable data possession scheme is proposed for cloud-based smart grid data management systems. …”
Get full text
Article -
290
Revisiting Sum of Residues Modular Multiplication
Published 2010-01-01“…In the 1980s, when the introduction of public key cryptography spurred interest in modular multiplication, many implementations performed modular multiplication using a sum of residues. …”
Get full text
Article -
291
Elliptic curve ElGamal encryption based location privacy-preserving scheme
Published 2020-06-01“…An elliptic curve ElGamal encryption based location privacy-preserving scheme was proposed to address the location privacy problem of secondary users in collaborative spectrum sensing.Firstly,secondary users encrypted the original sensing reports using the ElGamal public key techniques on the elliptic curve and sent them to the trusted property authority.Secondly,the trusted property authority partially decrypted and randomized sensing reports and then sent the randomized sensing reports to the fusion center.Thirdly,the fusion center finally decrypted and got the original sensing reports.Finally,security of the scheme was analyzed.According to the scheme,the encryption method of sensing reports was based on public key cryptography on elliptic curve.And the trusted property authority randomized encrypted sensing reports.Thus the location privacy of secondary users can be protected.Meanwhile,this scheme effectively reduces communication and storage cost,compared with other schemes.In addition,this scheme also has fault tolerant and dynamic mechanism,which increases the practicability and feasibility.…”
Get full text
Article -
292
A new cryptosystem based on an enhanced Vigenere cipher incorporating large SBoxes
Published 2025-01-01“…This technique relies on a significant enhancement of the conventional Vigenere method, incorporating the implementation of two large substitution tables generated from the widely used chaotic maps in cryptography. The system integrates new confusion/diffusion functions, governed by binary decision vectors of pseudorandom values. …”
Get full text
Article -
293
Privacy-preserving multi-attribute reverse spectrum auction scheme
Published 2020-09-01“…Aiming the problem that the existing reverse spectrum auctions do not take the non-price attribute of spectrum into account and the security of spectrum auction,a privacy-preserving multi-attribute reverse spectrum auction was proposed.Firstly,price and non-price positive attributes of spectrum were considered as the bidding scheme of bidders and auctions was performed to judge spectrum winners.Secondly,to ensure the security of the spectrum auction,the Paillier threshold system was used to introduce a group of spectrum auction servers of auctioneers to replace the traditional single third-party agency,which could prevent the fraud collusion between spectrum auctioneers and bidders.The cryptography tools such as the anonymization technology and oblivious transfer were introduced to achieve the secure features,which could make the spectrum auction performed securely.The security analysis shows that the security protocol has strong security.The performance of the protocol is also evaluated,and experimental results show that the security scheme is superior to the multi-attribute reverse auction security scheme that can be applied in the spectrum auction scenario in terms of computational overhead.…”
Get full text
Article -
294
Efficient and provably secure attribute-based online/offline encryption schemes
Published 2014-07-01“…To improve the encryption efficiency, the online/offline cryptography was extended to ABE and the primitive of attribute-based online/offline encryption (ABOOE) was proposed. …”
Get full text
Article -
295
Bit-Sliced Implementation of SM4 and New Performance Records
Published 2023-01-01“…SM4 is a popular block cipher issued by the Office of State Commercial Cryptography Administration (OSCCA) of China. In this paper, we use the bit-slicing technique that has been shown as a powerful strategy to achieve very fast software implementations of SM4. …”
Get full text
Article -
296
A Survey of Research Progress and Development Tendency of Attribute-Based Encryption
Published 2014-01-01“…With the development of cryptography, the attribute-based encryption (ABE) draws widespread attention of the researchers in recent years. …”
Get full text
Article -
297
Efficient revocable certificateless remote anonymous authentication protocol for wireless body area network
Published 2018-04-01“…To ensure the security and privacy of patients’ health data in wireless body area network (WBAN),communication parties must be mutual authenticated.Now some bilinear pairings led to a larger computation cost for users and tree structure revocation would lead to larger user storage cost.In order to achieve revocation and reduce the cost of the user side,a novel revocable certificate less remote anonymous authentication protocol for WBAN was proposed by using elliptic curve cryptography and revoke algorithm that could revoke users by updating their time-private-keys.Security requirements including anonymity,mutual authentication and session key establishment were satisfied in proposed scheme.Compared with the existing schemes,the experimental analysis shows that the computation cost and storage cost of the authentication protocol are greatly reduced,which is more suitable for resource-constrained WBAN.Security analysis also shows that the protocol is secure in the random oracle model.…”
Get full text
Article -
298
-
299
Eigenvalues of Relatively Prime Graphs Connected with Finite Quasigroups
Published 2024-01-01“…Spectral graph theory plays a very important role in understanding certifiable applications such as cryptography, combinatorial design, and coding theory. …”
Get full text
Article -
300
Comparative Study of Generalized Quantitative-Qualitative Inaccuracy Fuzzy Measures for Noiseless Coding Theorem and 1:1 Codes
Published 2015-01-01“…In coding theory, we study various properties of codes for application in data compression, cryptography, error correction, and network coding. The study of codes is introduced in Information Theory, electrical engineering, mathematics, and computer sciences for the transmission of data through reliable and efficient methods. …”
Get full text
Article