The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Proxy re-encryption (PRE) allows a ciphertext computed under Alice's public key to be transformed to those which can be decrypted by Bob. Since Blaze et al. introduced the concept of proxy re-encryption in Eurocrypt'98, there are many results on proxy re-encryption. However, all the proxy re-encryption schemes proposed until now assume the proxy having no its own public/private keys. In this paper,...
The program data is encrypted at the time the data is introduced into the system. Program data stays encrypted until sent to MC to be decoded and display on TV. The encryption keys for the program data are never transferred out side of the data center. Instead, the “seed keys” are sent out. A secret algorithm is used to convert a seed key to a real key for decryption.
We introduce a non-interactive RSA time-lock puzzle scheme whose level of difficulty can be arbitrarily chosen by artificially enlarging the public exponent. Solving a puzzle for a message m means for Bob to encrypt m with Alice's public puzzle key by repeated modular squaring. The number of squarings to perform determines the puzzle complexity. This puzzle is non-parallelizable. Thus, the solution...
LUC cryptosystem is a public key cryptosystem based on Lucas functions. The encryption of this cryptosystem is relatively easy since we have the knowledge of public key e, two primes p and q and also the message M. Meanwhile, decryption process is difficult without the knowledge of private key d. In this paper, we are presenting a technique that can be used to compute private key for LUC cryptosystem...
In open network environment, a group-oriented encryption scheme is vulnerable to collude attack since lots of members are involved in such a scheme. In order to improve the security of Ma et al.'s encryption scheme and make it withstand collude attack, the identities of the users are used in designing the group-oriented encryption scheme in this paper. A sender in this scheme is allowed to encrypt...
Symmetric key cryptography is one of the prominent means of secure data transfer through unreliable channel. It requires less overhead than public key cryptosystem. We present here, a new algorithm based on 2D geometry using property of circle, and circle-centered angle. It is a block cipher technique but has the advantage of producing fixed size encrypted messages in all cases. It incorporates low...
In many business sectors sending secure information over public channels has become a challenging task. Data encryption is not the most efficient method to counteract attacks by adversaries. One form of encryption is to use the same key by the sender for encryption as well as the receiver for decryption. World-wide encryption standards such as DES and AES are used in Government and public domains...
The use of encryptions in remote sensing satellites for encrypting payload data / images are increasing day by day, especially for high-resolution payloads. Most of the encryption schemes employed is private key encryption, where encryption key and decryption key is same. Key management problem starts when a satellite uses private key schemes and supplies data to multiple ground stations. These ground...
Once an application steps out of the bounds of a single-computer box, its external communication is immediately exposed to a multitude of outside observers with various intentions, good or bad. In order to protect sensitive data while these are en route, applications invoke different methods. In today's world, most of the means of secure data and code storage and distribution rely on using cryptographic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.