The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For the first time it is proposed a stream deniable-encryption algorithm. The algorithm generates cryptogram that is computationally indistinguishable from the cryptogram produced by some probabilistic encryption algorithm, called associated probabilistic algorithm, while ciphering a fake message with a fake key. When the sender and receiver of the message are coerced to open the encryption key, they...
Public key cryptosystem or the asymmetric crypto system is more secured than secret key method because a pair of related keys is being used at both sender and receiver's end. In this paper we propose an efficient Bernstein polynomial over Galois field GF(p). This public key cryptographic technique is used for secured transmission of image. This work considers compressing the original image using Bernstein...
While not explicitly stated in the U.S. Constitution, the rights of privacy for many aspects of our lives including religious beliefs, personal possession, and personal information are protected under the Bill of Rights. Nonetheless, news about different forms of privacy invasion has become a daily affair. From the sale of personal information to identity theft, from Google and YouTube surrendering...
We propose a new notion called attribute-based sign-cryption with cipher text-policy and claim-predicate mechanism (CP2-ABSC), which is inspired by the recent developments in attribute-based encryption and attribute-based signature. In this notion, a signcrypting party, who possesses a set of attributes from the authority, can sign a message with a claim-predicate that is satisfied by his attributes,...
Cryptography is the practice and study of hiding information. Cryptanalysis is the study of how to crack encryption algorithms or their implementations. This paper describes an effortless method of a cryptanalyst for a knapsack cipher. The describing method is based on simple programming and calculations to crack the knapsack cipher.
In mission-critical activities, each user is allowed to access some specific, but not all, data gathered by wireless sensor networks. Yu et al~\cite{YRL09} recently proposed a centralized fine grained data access control mechanism for sensor networks, which exploits a cryptographic primitive called attribute based encryption (ABE). There is only one trusted authority to distribute keys to the sensor...
Many Attribute-Based Encryption (ABE) schemes do not protect receivers' privacy, such that all the attributes to describe the eligible receivers are transmitted in plaintexts. Hidden policy-based ABE schemes have been proposed to protect receivers' privacy by using a construction that requires every user in the system to decrypt the ciphertext using all the attributes they possess, which incurs great...
In recent years, there has been increasing trend for multimedia applications to use delegate service providers for content distributions. These delegate services have brought new challenges to the protection of multimedia content confidentiality. Encryption can be used to hide information from unauthorized individuals, either in transit or in storage. This technique transforms the content into unintelligible...
Recently, many multireceiver identity-based encryption schemes have been proposed in the literature. However, none can protect the privacy of message receivers among these schemes. In this paper, we present an anonymous multireceiver identity-based encryption scheme where we adopt Lagrange interpolating polynomial mechanisms to cope with the above problem. Our scheme makes it impossible for an attacker...
Delivering messages anonymously in ad hoc network is very important because of the special characteristics. Meantime, a trusted third party can trace the message sender by using some secret keys in case of dispute. Recently, a multi-PKG ID-based signcryption scheme for ad hoc networks is proposed, which is semantic security and existential unforgeability in random oracle model. But it is not anonymous...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.