Search
Search Results
-
Single Secret Sharing Scheme Using Chinese Remainder Theorem, Modified Shamir’s Scheme and XOR Operation
The existing scheme uses lightweight modular arithmetic and Boolean operations for the secret sharing scheme by compromising minor degradation in...
-
Evaluation and performance analysis of Chinese remainder theorem and its application to lossless image compression
Chinese remainder theorem (CRT) is widely utilized in many cryptographic applications and additionally the reversible nature of CRT is employed in...
-
Multitiered Dynamic Threshold-Based Mobile Agents Secure Migration Using Lagrange Polynomial and Chinese Remainder Theorem
A mobile agent is a software process that works repeatedly on the behalf of its owner. Mobile agents are an emerging computing area that replaces... -
Multi-factor user authentication and key agreement scheme for wireless sensor networks using Chinese remainder theorem
To formulate a secure and efficient user authentication scheme for wireless sensor networks(WSNs) is a complicated task, because sensors are placed...
-
ECC-CRT: An Elliptical Curve Cryptographic Encryption and Chinese Remainder Theorem based Deduplication in Cloud
Cloud computing provides the data storage facility for the maintenance, management and remote backup of the data. The storage cost and data...
-
Determination of Common Remainder from Its Redundancy Residual Set
In this paper, we give two methods to estimate common remainder from its residue set with errors. Two types of redundancy schemes are considered... -
Group Authorization Using Chinese Remainder Theorem
The paper presents a new way of group authorization for a population of users of a given IT system. Group authorization is highly desirable in... -
Strongly-resilient, well connected, non-interactive and gateway-free hierarchical deterministic key agreement schemes using Chinese remainder theorem
Efficient key agreement schemes (KAS) that manage symmetric key cryptographic (SKC) secrets (or keys) are essential for lightweight security...
-
Proving the (In)Security of CRT Based Key Management Schemes Under SAOA Model
There have been several proposed methods in the literature for securely distributing group keys and managing group dynamics for secure group...
-
The Periodic Task Synchronized Scheduling Strategy of Electromagnetic Compatibility
Considering that electromagnetic interference inevitably occurs between concurrent tasks of combat platform, this paper is concerned with periodic... -
Efficient RNS Realization of High-Speed Arithmetic Multiplier with Respect to Cryptographic Computation
As in the digital era, there will always be a demand for high-speed algorithms and techniques that can accelerate computations. Arithmetic... -
A Hybrid-Based Verifiable Secret Sharing Scheme Using Chinese Remainder Theorem
It is not always in the best interests to rely on an individual to have control of entire sensitive information. This has led to the need for secret...
-
Enhanced AES for Securing Hand Written Signature Using Residue Number System
The uncertainty and vulnerability of symmetric algorithm, Advanced Encryption Standard (AES), which uses a shared public secret key, however, timing... -
PPDMIT: a lightweight architecture for privacy-preserving data aggregation in the Internet of Things
Data is generated over time by each device in the Internet of Things (IoT) ecosphere. Recent years have seen a resurgence in interest in the IoT due...
-
Enhancing data protection with a distributed storage system based on the redundant residue number system
Big data becomes the key for ubiquitous computing and intelligence, and Distributed Storage Systems (DSS) are widely used in large-scale data centers...
-
A Chebyshev polynomial-based conditional privacy-preserving authentication and group-key agreement scheme for VANET
Vehicle ad hoc network (VANET) is an open communication environment. Any user can broadcast messages, which means that it can be easily attacked by...
-
Authenticated key agreement for IoT network using HECC and CRT four co-primes
Internet of Things (IoT) is an integral part of our daily lives and the security of these devices is paramount. However, IoT devices are often...
-
Euler Totient Function and Fermat-Eulller Theorem Based on Optimized Key Management Scheme for Securing Mobile Agents Migration
As mobile agents move automatically on distributed networks, the security of agents and platforms is of prime concern. Over the years, mobile... -
An Enhancement in Crypto Key Generation Using Image Features with CRT
Strong cryptographic algorithms are the main sources for building security systems. However, providing security depends on the secret information... -
Secure Information Migration Using Mignotte Sequence with Integral Transform
This paper describes enhancing secure communication-based on secret sharing using Chinese remainder theorem and integral transform. Some of the...