-
21
An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw Method
Published 2021-01-01“…Moreover, the test experiment and security analyses are given; the results show that our proposed cryptosystem has both security and speed performance.…”
Get full text
Article -
22
Secure and Privacy Enhanced Gait Authentication on Smart Phone
Published 2014-01-01“…In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone. …”
Get full text
Article -
23
Secure computation protocol of Chebyshev distance under the malicious model
Published 2024-07-01“…This paper proposes a secure protocol for computing Chebyshev distance under a semi-honest model, leveraging the additive homomorphic properties of the NTRU cryptosystem and a vector encoding method. This protocol transforms the confidential computation of Chebyshev distance into the inner product of confidential computation vectors, as demonstrated through the model paradigm validating its security under the semi-honest model. …”
Get full text
Article -
24
Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates
Published 2024-01-01“…Considering secure computing for multilevel users in enterprises, the notion of hierarchical identity-based inner product functional encryption (HIB-IPFE) is proposed. In this cryptosystem, a sender can encrypt a vector x→ into a ciphertext with a hierarchical identity, while a receiver who possesses a secret key corresponding to the same hierarchical identity and a vector y→ can decrypt the ciphertext and obtain the inner product x→,y→. …”
Get full text
Article -
25
Query-Biased Preview over Outsourced and Encrypted Data
Published 2013-01-01“…We achieve this novel result by making a document (plaintext) previewable under any cryptosystem and constructing a secure index to support dynamic computation for a best matched snippet when queried by some keywords. …”
Get full text
Article -
26
Aggregation Scheme with Secure Hierarchical Clustering for Wireless Sensor Networks
Published 2012-07-01“…Due to our IP naming rules and type 1 nodes as cluster heads, public key cryptography, such as RSA (Rivest, Shamir, Adleman), or ECC (Elliptic Curve Cryptosystem), is easily implanted to our system to strengthen our security. …”
Get full text
Article -
27
Dual-Mode Encryption for UC-Secure String OT from Learning with Errors
Published 2024-01-01“…In this work, we put forward a modified dual-mode encryption cryptosystem under the decisional LWE assumption, from which we can derive a UC-secure string OT with both full-fledged dual-mode security and better efficiency on transmitting strings. …”
Get full text
Article -
28
Possibilities of using immersive learning based on abstract highly formalized mathematical models for training future mathematics teachers
Published 2024-12-01“…In the process of studying the mathematical model of the RSA cryptosystem and its implementation in the Maxima computer algebra system, students experience a ‘partial’ immersion in the environment being studied, since to observe the results it is necessary to know the mathematical model and a number of functions that can provide a certain result. …”
Get full text
Article