Search
Search Results
-
Image encryption scheme based on symmetric multimodal skew tent map
This paper proposes a novel scheme for image encryption based on symmetric multimodal skew tent map. The proposed map exhibits good statistical...
-
Updatable and Dynamic Searchable Symmetric Encryption Scheme with Forward and Backward Privacy
Dynamic searchable symmetric encryption (DSSE) enables search and modification on encrypted data. While considerable efforts have been dedicated to... -
Lightweight symmetric key encryption for text using XOR operation and permutation matrix
Traditionally, symmetric key encryption has been computationally intensive, and the balance between security and computation costs has necessitated...
-
Efficient searchable symmetric encryption supporting range queries
The demand for cloud storage services continuously increases putting at risk the privacy of the outsourced data. Data encryption is the obvious...
-
Novel secure data protection scheme using Martino homomorphic encryption
Globally, data maintenance and its security are vital tasks due to the rapid development of advanced technologies. Users now utilise Cloud computing...
-
A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm
In the era of digital communication and data security, image encryption plays a crucial role in safeguarding sensitive information. Protecting...
-
Puncturable ciphertext-policy attribute-based encryption scheme for efficient and flexible user revocation
With the rapid deployment of storage services, secure and efficient user authorization and revocation data shared through the cloud have become a...
-
A hybrid lightweight blockchain based encryption scheme for security enhancement in cloud computing
Cloud services provide an optimal form of demand based data outsourcing. The large amount of user data sharing increases the possibility of attacks,...
-
Efficient Wildcard Searchable Symmetric Encryption with Forward and Backward Security
Wildcard Searchable Symmetric Encryption can achieve flexibility and pattern matching while protecting data privacy. There is a promising future for... -
A plaintext-related image encryption scheme based on key generation using generative adversarial networks
Image encryption based on chaotic systems is a hot research topic in recent decade. However, the existing methods have shortcomings in key generation...
-
The COLM Authenticated Encryption Scheme
In this work we present the COLM authenticated encryption (AE) scheme which is the second of the two winners in the defense in depth category of the...
-
Injection-Secure Structured and Searchable Symmetric Encryption
Recent work on dynamic structured and searchable symmetric encryption has focused on achieving the notion of forward-privacy. This is mainly... -
TPE-MM: Thumbnail preserving encryption scheme based on Markov model for JPEG images
Advances in mobile communication have enabled images to be shared more conveniently, and the consequent risk of privacy breaches has been...
-
Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud
Cloud-based data sharing addresses the limited storage availability problem for resource-constrained users albeit at the cost of privacy and the need...
-
General construction of compressive integrity auditing protocol from strong homomorphic encryption scheme
In the applications of cloud storage, ensuring data’s integrity is an important research problem and kinds of remote integrity auditing protocols...
-
Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage
Searchable symmetric encryption (SSE) has been introduced for secure outsourcing the encrypted database to cloud storage, while maintaining...
-
Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment
With the rapid development of cloud computing technology, how to achieve secure access to cloud data has become a current research hotspot....
-
A novel and secure image encryption scheme based on two-dimensional logistic and Arnold Cat map
Digital images are information carriers in the latest era of technology. Therefore, securing digital images or kee** data, videos, or confidential...
-
CESCAL: A joint compression-encryption scheme based on convolutional autoencoder and logistic map
In the modern digital world, it is getting harder to share voluminous data with high dimensions, over the internet with adequate security. Images...
-
Mh-abe: multi-authority and hierarchical attribute based encryption scheme for secure electronic health record sharing
The modern medical system is convergence of cutting-edge technologies and advancements in the healthcare environment. In the modern medical system,...