The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A two-layered hybrid cryptosystem is proposed here. In symmetric key cryptosystem, the shared key is sent over a channel to the receiver. If an encrypted shared key is sent, the chance of intercepting the original key is reduced to some extent. So a hybrid cryptosystem is introduced here which is a combination of both asymmetric key and symmetric key cryptosystem. In the proposed technique, the encryption...
In this paper we introduce the notion of lockable obfuscation. In a lockable obfuscation scheme there exists an obfuscation algorithm Obf that takes as input a security parameter, a program P, a message msg and lock value lck and outputs an obfuscated program oP. One can evaluate the obfuscated program oP on any input x where the output of evaluation is the message msg if P(x) = lck and otherwise...
In cloud computing environment various forms of services allows users to store the information at remote location. But, there are many drawbacks as well because of the remote storage. However, it is plagued by security issues despite its numerous advantages. The paper presents a review of the current security issues in cloud computing environment like lack of control of data, lack of trust and multi-tenancy...
Ciphertext-Policy Attribute-based Encryption (CP-ABE) is a useful cryptographic scheme and is being considered for cloud application as more and more users leverage cloud platforms to store and process their data. However, existing CP-ABE schemes still have a number of limitations that make it not effective to be used in a practical application. Firstly, the size of the ciphertext and the time for...
Proxy re-encryption (PRE) is an important cryptographic primitive used for private information sharing. However, the recent advance in quantum computer has potentially crippled its security, as the traditional decisional Diffie-Hellman (DDH)-based PRE is venerable to the quantum attack. Thus, learning with errors (LWE)-based PRE schemes, as a kind of latticebased construction with the inherent quantum-resistant...
Cloud computing has acted both like a boon as well as a bane. The amount of flexibility it provides and the costing adds to the positive side. Compromise in terms of security is one of the flaws that proves to be a big threat for the user. We here try to rectify this flaw by proposing a system which provides both encryption as well as an access control system for the users. In the paper we first introduce...
Efficient multi-keyword fuzzy search over encrypted data is a desirable technology for data outsourcing in cloud storage. The current solutions can only support part of these goals. In this paper, we propose a novel encrypted data searching scheme that can support multiples keywords fuzzy search with high efficiency. To support fuzzy search, a new keyword-hash mapping function is designed to transform...
Encryption is a traditional method of scrambling data beyond recognition. For years, encryption has been widely used in various areas and domains where secrecy and confidentiality were required. However, there are certain encryption techniques that are not allowed in some countries. In these cases, steganography may come as a solution for hiding data using an apparently inoffensive and innocent carrier...
Image Encryption is a technique to make the image unreadable. This can be achieved by realigning the pixel value of image or by changing the pixel value of an image. In this paper, an image encryption algorithm has been proposed where pixel value is changed using logistic map (diffusion) and position of pixel value is changed using flipping (confusion). The simulation result shows that encryption...
With the fast developing of computer hardware, many problems which are previously considered hard, will be solved practically. Number of theoretical problems that form the core of many public key cryptosystems are such of them. Therefore, new cryptosystems which are designed based on other mathematical techniques are of great demands. NTRU which is based on the hardness of lattice problems is one...
This paper proposed a new secret key random block cipher as a candidate for Reaction Automata Direct Graph (RADG method). A new secret key consists of a 64-bit block size and a 128-bit key length. A new algorithm based in design on Generalized Unbalanced Feistel Network and uses a new S-boxes generated from a DES S-boxes, a bijective F function, bitwise operations and a carefully key schedule design...
Applying security to the transmitted image is very important issues, because the transmission channel is open and can be compromised by attackers. To secure this channel from the eavesdropping attack, man in the middle attack, and so on. A new hybrid encryption image mechanism that utilize triangular scrambling, DNA encoding and chaotic map is implemented. The scheme takes a master key with a length...
In cloud services, deduplication technology is commonly used to reduce the space and bandwidth requirements of services by eliminating redundant data and storing only a single copy. Deduplication is most effective when multiple users outsource the same data to the cloud storage, but it raises issues relating to security and ownership. Proof-ofownership schemes allow any owner of the same data to prove...
The development of three modular Rabin's encryption algorithm with using ordinary integer and modified perfect forms of the system of residual classes is presented in this paper. This method takes precedence over classic in choosing modules of the same order in sustainability by increasing the block of plaintext for encryption. New methods for implementation of major labor-intensive operations of...
In the present paper, the author has introduced an algorithm BXET which can be used to encrypt data that is in transit across the network. It is an improvised version of ADES-1 where the key, unlike ADES-1, is shared between the sender and the receiver and is not sent across the network. The number of times noise introduced and the positions where the noises are introduced are dependent on the key...
The digital equivalent of a handwritten signature or stamped seal, but offering far more inherent security, a digital signature is intended to solve the problem of tampering and impersonation in digital communications. Digital signatures can provide the added assurances of evidence to origin, identity and status of an electronic document, transaction or message, as well as acknowledging informed consent...
Cryptographers used to associate provable security with public-key cryptography, asymptotic analyses, and inefficient proof-of-concept designs. These associations are outdated, invalidated by the emergence of practice-oriented provable security. Its rise supports as the backdrop for a constructionist view of cryptography. This view entails that claim that cryptographic work isn't a consequence of...
Data hacking is very difficult to deal with today's electronic world. There are large numbers of technique used, for the secure communication of data. Images are widely used in different-different processes. So data hiding is used in the encrypted image, but the main problem is that distortion at the time of data extraction. Reversible data hiding in encrypted image is used to solve this problem....
In this technology era, every sensitive data must be secured. Visual cryptography is a technique to hide the image based secret. In visual cryptography the secret image is encrypted in to shares and at decryption side all shares are superimposed with each other so that secret is revealed. The key feature of visual cryptography is that, no difficult computation is needed at decryption side to decrypt...
For secured communication of information steganography is preferred, which embeds the information in a cover object. The objective is to propose a modified high-capacity steganography technique based on wavelet transform with acceptable levels of imperceptibility and distortion in the cover image and with high level of overall security. Wavelet transforms are considered to be an ideal domain for image...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.