Filters








836 Hits in 3.9 sec

A Provably Secure Elliptic Curve Scheme with Fast Encryption [chapter]

David Galindo, Sebastià Martín, Tsuyoshi Takagi, Jorge L. Villar
2004 Lecture Notes in Computer Science  
We present a new elliptic curve cryptosystem with fast encryption and key generation, which is provably secure in the standard model.  ...  Despite the typical bit length of n, our encryption algorithm is faster than El Gamal elliptic curve cryptosystems.  ...  Thus, our cryptosystem is the provably secure IND-CPA elliptic curve cryptosystem in the standard model with the fastest encryption algorithm to the best of our knowledge.  ... 
doi:10.1007/978-3-540-30556-9_20 fatcat:g65o2ye7bzcvllr4jnfvj5gnla

Page 10572 of Mathematical Reviews Vol. , Issue 2004m [page]

2004 Mathematical Reviews  
Summary: “This paper proposes an efficient and provably secure transform to encrypt a message with any asymmetric one-way cryptosystem.  ...  intractable problem of fast and highly secure image encryption.  ... 

Combining Public Key Encryption with Schnorr Digital Signature

Laura Savu
2012 Journal of Software Engineering and Applications  
Signcryption primitive is a better approach then Encrypt-then-Sign or Sign-then-Encrypt methods regarding the costs.  ...  The purpose of the study is to combine the public key encryption with Schnorr digital signature in order to obtain less computational and communicational costs.  ...  Zheng also proposed an elliptic curvebased signcryption scheme that saves 58% of computational and 40% of communication costs when it is compared with the traditional elliptic curve-based signaturethen-encryption  ... 
doi:10.4236/jsea.2012.52016 fatcat:lnmjdpret5e63atgffv6snkc7q

Solving Hidden Number Problem with One Bit Oracle and Advice [chapter]

Adi Akavia
2009 Lecture Notes in Computer Science  
Rogaway, DHIES: An encryption scheme based on the Diffie-Hellman problem, Preprint, 2001. [2] L. M. Adleman and J.  ...  A subexponential algorithm for discrete logarithms over the rational subgroup of the Jacobians of large genus hyperelliptic curves over finite fields, ANTS I (L. M.  ...  Optimal asymmetric encryption -How to encrypt with RSA, EUROCRYPT 1994 (A. De Santis, ed.), LNCS, vol. 950, Springer, 1995, pp. 92-111.  ... 
doi:10.1007/978-3-642-03356-8_20 fatcat:lst54auksbgvxaynf3gtsswva4

Survey on Emerging Security Mechanisms for Medical Cyber Physical Systems

Anupama C V, Misha Ravi
2017 International Journal Of Engineering And Computer Science  
So, the data should be secured in each layers. So many normal encipher mechanisms are used. Also, emerging encryption technology such as homomorphic encryption standards used in MCPS.  ...  Index Terms-Medical cyber physical systems, medical data privacy, homomorphic encryption, attribute-based encryption  ...  While this design implies only secure storage using conventional encryption schemes, emerging encryption schemes provide options for secure data sharing and secure computation. II.  ... 
doi:10.18535/ijecs/v6i2.06 fatcat:4gtyoa2qvvgszkog7ruleyrjri

Secure and Efficient Authentication Scheme for Cloud Computing

Mohamed M., Ahmed A., Ahmed H.
2016 International Journal of Computer Applications  
In this paper; an efficient and provably secure authentication mechanism is proposed to give a legitimate user the right to access and manage the cloud resources.  ...  So enterprises can use the available services and resources to develop, host, and run services over their infrastructure in a flexible way anytime, anywhere with minimal management efforts.  ...  Where 4a3+27b2≠ 0, so that for each value of a&b gives a different elliptic curve so that all points (x,y) which satisfies the Security of elliptic curve The main issue which describes the security  ... 
doi:10.5120/ijca2016909883 fatcat:q2ytxedtpbewha4gg23jnxzlzq

Page 6573 of Mathematical Reviews Vol. , Issue 99i [page]

1999 Mathematical Reviews  
functions, and also presented a construction method for broadcast encryption schemes that com- bines Fiat-Naor key predistribution schemes with ideal secret shar- ing schemes.  ...  The practical significance of the technique is illustrated by giving the design for three $10 million custom machines which could be built with current technology: one finds elliptic curve logarithms in  ... 

Encrypted Keyword Search in Cloud Storage

Minnu K Praveen
2019 International Journal of Wireless Communications and Network Technologies  
An AES algorithm with ECC scheme and keyword server technique is used to handle this issue efficiently. This technique ensures faster and secure access of files in the cloud.  ...  This paper deals with the technique that uses the cloud to search file in the encrypted form.  ...  It also introduces a special adversary to break the provable security reduction scheme.  ... 
doi:10.30534/ijwcnt/2019/12832019 fatcat:felvypwiobaupgmgjaympqiqjy

Symmetric Cryptography [chapter]

2006 Security in Fixed and Wireless Networks  
Therefore, cryptology is a research area with a high strategic impact for industries, individuals, and for the society as a whole.  ...  Digital signature algorithms (in combination with hash functions) replace hand-written signatures in electronic transactions. A similar role can be played by MAC algorithms.  ...  on elliptic curve.  ... 
doi:10.1002/0470863722.ch3 fatcat:kye7h3pmnbhkjksvyr4tj4nj7e

symmetric cryptography [chapter]

Martin H. Weik
2000 Computer Science and Communications Dictionary  
Therefore, cryptology is a research area with a high strategic impact for industries, individuals, and for the society as a whole.  ...  Digital signature algorithms (in combination with hash functions) replace hand-written signatures in electronic transactions. A similar role can be played by MAC algorithms.  ...  on elliptic curve.  ... 
doi:10.1007/1-4020-0613-6_18768 fatcat:24uzmmq3pbekxhlquwjzglnsve

Page 5692 of Mathematical Reviews Vol. , Issue 2003g [page]

2003 Mathematical Reviews  
elliptic curve (126-141); Erkay Savas, Thomas A.  ...  Katsuyuki Okeya and Kouichi Sakurai, Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recov- 93 SYSTEMS THEORY; CONTROL 5692 ery of the y-coordinate on a Montgomery-form  ... 

Page 6509 of Mathematical Reviews Vol. , Issue 2003h [page]

2003 Mathematical Reviews  
The scheme has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffie-Hellman problem. Our system is based on the Weil pairing.  ...  We point out a concrete vulnerability of some of the previous schemes and present an efficient fair blind signature scheme with a security proof against most general attacks.  ... 

Rethinking Authentication on Smart Mobile Devices

Ding Wang, Jian Shen, Joseph K. Liu, Kim-Kwang Raymond Choo
2018 Wireless Communications and Mobile Computing  
Zhang et al. presents an anonymous authenticated key exchange protocol, based on Elliptic Curves Cryptography (ECC).  ...  encryption scheme.  ... 
doi:10.1155/2018/7079037 fatcat:v52bgxp5enbqddcqy557hilstm

Development of digital signature algorithm based on the Niederriter crypto-code system

О.С. Циганенко
2020 Системи обробки інформації  
basic security services.  ...  The paper analyzes the construction of the crypto-code structure of the Niederriter on elliptical (EC), modified elliptical codes (MEC) shortened and / or extended, and defective codes, practical algorithms  ...  model for encryption and distribution is a "semantically secure encryption" scheme.  ... 
doi:10.30748/soi.2020.162.09 fatcat:xs6v4myjvbfvhd3sbjbkjypoti

A Lightweight and Secured Certificate-Based Proxy Signcryption (CB-PS) Scheme for E-Prescription Systems

Insaf Ullah, Noor Ul Amin, Ahmad Almogren, Muhammad Asghar Khan, M. Irfan Uddin, Qiaozhi Hua
2020 IEEE Access  
In 2014, Lo and Tsai [33] , a provable secured PS scheme is presented for efficient communication system.  ...  The proposed scheme is based on hyperelliptic curve, an advanced version of elliptic curve characterized by a small parameter and key size (80 bits) as compared to elliptic curve, in which the key size  ...  If the additional bits are smaller in size, then the communication will be fast; otherwise, delays will occur in communications. In this phase, we compare our designed CB-PS with existing ones, i.e.  ... 
doi:10.1109/access.2020.3033758 fatcat:745n3yssvnhnffzcy2zkggbfvu
« Previous Showing results 1 — 15 out of 836 results