Showing 21 - 28 results of 28 for search '"cryptosystems"', query time: 0.04s Refine Results
  1. 21

    An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw Method by Zhen Li, Changgen Peng, Weijie Tan, Liangrong Li

    Published 2021-01-01
    “…Moreover, the test experiment and security analyses are given; the results show that our proposed cryptosystem has both security and speed performance.…”
    Get full text
    Article
  2. 22

    Secure and Privacy Enhanced Gait Authentication on Smart Phone by Thang Hoang, Deokjai Choi

    Published 2014-01-01
    “…In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone. …”
    Get full text
    Article
  3. 23

    Secure computation protocol of Chebyshev distance under the malicious model by Xin Liu, Weitong Chen, Lu Peng, Dan Luo, Likai Jia, Gang Xu, Xiubo Chen, Xiaomeng Liu

    Published 2024-07-01
    “…This paper proposes a secure protocol for computing Chebyshev distance under a semi-honest model, leveraging the additive homomorphic properties of the NTRU cryptosystem and a vector encoding method. This protocol transforms the confidential computation of Chebyshev distance into the inner product of confidential computation vectors, as demonstrated through the model paradigm validating its security under the semi-honest model. …”
    Get full text
    Article
  4. 24

    Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates by Cheng-Yi Lee, Zi-Yuan Liu, Masahiro Mambo, Raylin Tso

    Published 2024-01-01
    “…Considering secure computing for multilevel users in enterprises, the notion of hierarchical identity-based inner product functional encryption (HIB-IPFE) is proposed. In this cryptosystem, a sender can encrypt a vector x→ into a ciphertext with a hierarchical identity, while a receiver who possesses a secret key corresponding to the same hierarchical identity and a vector y→ can decrypt the ciphertext and obtain the inner product x→,y→. …”
    Get full text
    Article
  5. 25

    Query-Biased Preview over Outsourced and Encrypted Data by Ningduo Peng, Guangchun Luo, Ke Qin, Aiguo Chen

    Published 2013-01-01
    “…We achieve this novel result by making a document (plaintext) previewable under any cryptosystem and constructing a secure index to support dynamic computation for a best matched snippet when queried by some keywords. …”
    Get full text
    Article
  6. 26

    Aggregation Scheme with Secure Hierarchical Clustering for Wireless Sensor Networks by Tung-Shih Su, Mei-Wen Huang, Wei-Shou Li, Wen-Shyong Hsieh

    Published 2012-07-01
    “…Due to our IP naming rules and type 1 nodes as cluster heads, public key cryptography, such as RSA (Rivest, Shamir, Adleman), or ECC (Elliptic Curve Cryptosystem), is easily implanted to our system to strengthen our security. …”
    Get full text
    Article
  7. 27

    Dual-Mode Encryption for UC-Secure String OT from Learning with Errors by Momeng Liu, Yupu Hu, Qiqi Lai, Shanshan Zhang, Huiwen Jia, Wen Gao, Baocang Wang

    Published 2024-01-01
    “…In this work, we put forward a modified dual-mode encryption cryptosystem under the decisional LWE assumption, from which we can derive a UC-secure string OT with both full-fledged dual-mode security and better efficiency on transmitting strings. …”
    Get full text
    Article
  8. 28

    Possibilities of using immersive learning based on abstract highly formalized mathematical models for training future mathematics teachers by Valentina A. Matveeva, Olga Yu. Zaslavskaya

    Published 2024-12-01
    “…In the process of studying the mathematical model of the RSA cryptosystem and its implementation in the Maxima computer algebra system, students experience a ‘partial’ immersion in the environment being studied, since to observe the results it is necessary to know the mathematical model and a number of functions that can provide a certain result. …”
    Get full text
    Article