Search
Search Results
-
Multi-Party Threshold Cryptography
In a threshold cryptosystem, the private key is typically distributed among parties that constitute the system using cryptographically secure secret... -
A fake threshold visual cryptography of QR code
Visual cryptography (VC) is a technique that can encrypt images without complicated calculation. As the image, the quick response (QR) code can also...
-
Exploring recent advances in random grid visual cryptography algorithms
Visual cryptography scheme is initiated to securely encode a secret image into multiple shares. The secret can be reconstructed by overlaying the...
-
Security enhancement of an (n, n) threshold non-expansible XOR-based visual cryptography with unique meaningful shares
More and more visual cryptography (VC) schemes have been engaged by introducing computational operations, such as XOR, in the secret decoding phase....
-
Implementing Post-quantum Cryptography for Developers
Widely used public key cryptography is threatened by the development of quantum computers. Post-quantum algorithms have been designed for the purpose...
-
Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography
Distributed oblivious polynomial evaluation (DOPE) is a variant of two-party computation where a sender party... -
Security enhanced random grid visual cryptography scheme using master share and embedding method
Visual cryptography scheme is one of the main branches of secret sharing. The image is converted into various shares and then recouped by overlap**...
-
Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis
In today's interconnected world, safeguarding digital data's confidentiality and security is crucial. Cryptography and steganography are two primary...
-
Quantum-safe cryptography: crossroads of coding theory and cryptography
We present an overview of quantum-safe cryptography (QSC) with a focus on post-quantum cryptography (PQC) and information-theoretic security. From a...
-
Approach for Protecting Mobile Device User’s Data Based on Multifactor Authentication, Visual Cryptography, and Steganography
AbstractAn approach is proposed to protect user’s personal data stored on mobile devices running the Android OS, which combines multifactor...
-
Use of cryptography in malware obfuscation
Malware authors often use cryptographic tools such as XOR encryption and block ciphers like AES to obfuscate part of the malware to evade detection....
-
Modified lightweight cryptography scheme and its applications in IoT environment
Interconnected devices have been with us for a long time. The security of the data exchanged through these devices is a matter of grave concern....
-
Identity-Based Threshold Signatures from Isogenies
The identity-based signature, initially introduced by Shamir [26], plays a fundamental role in the domain of identity-based cryptography. It offers... -
XVC scheme-based secret sharing model with hybrid optimization algorithm for visual cryptography
Visual cryptography (VC) is a model that permits visual data in an encrypted manner in such a way that decrypted data occurs in the form of visual...
-
Contrast-enhanced visual cryptography schemes based on block pixel patterns
Block-wise visual cryptography scheme is size invariant and it provides perfect security. It eliminates pixel expansion and security problems but it...
-
Cryptography
This chapter will cover cryptography and its two main types, symmetric cryptography and public key cryptography. After exploring some fundamental... -
TVES: Threshold Verifiably Encrypted Signature and Its Applications
Verifiably Encrypted Signature (VES) is useful to enable fair exchange in online contract signing. This cryptographic primitive introduces the... -
Efficient multimodal cancelable biometric system based on steganography and cryptography
Due to the development of hacking programs, it has become easy to penetrate systems. Hence, there is a need for strong security mechanisms. The use...
-
Secure video steganographic model using framelet transform and elliptic curve cryptography
Information security holds a quintessential role in the era of digital communication. Nowadays, social media has become the new platform to share a...
-
Cutting the GRASS: Threshold GRoup Action Signature Schemes
Group actions are fundamental mathematical tools, with a long history of use in cryptography. Indeed, the action of finite groups at the basis of the...