Search
Search Results
-
Secure and efficient multi-key FHE scheme supporting multi-bit messages from LWE preserving non-interactive decryption
We consider multi-key fully homomorphic encryption (multi-key FHE) which is the richest variant of fully homomorphic encryption (FHE) that allows...
-
A reconfigurable and compact subpipelined architecture for AES encryption and decryption
AES has been used in many applications to provide the data confidentiality. A new 32-bit reconfigurable and compact architecture for AES encryption...
-
Blockchain-Based Fair Payment for ABE with Outsourced Decryption
Attribute-based encryption (ABE) is an advanced public-key encryption supporting fine-grained access control and flexible sharing of encrypted data....
-
A two-layer networks-based audio encryption/decryption scheme via fixed-time cluster synchronization
In this paper, an audio encryption/decryption scheme based on the cluster synchronization of two-layer complex networks within fixed-time is...
-
Symmetric key and polynomial-based key generation mechanism for secured data communications in 5G networks
Fifth Generation (5G) networks provide data communications through various latest technologies including Software Defined Networks (SDN), Artificial...
-
Encryption/Decryption with Optical Transform
In this chapter, the methods of image encryption and decryption based on optical transformation are introduced. The extended fractional Fourier... -
Unbounded Attribute-Based Encryption Supporting Non-Monotonic Access Structure and Traceability without Key Escrow
Attribute-based encryption (ABE) can achieve data confidentiality as well as fine-grained access control of encrypted data in data outsourcing...
-
Color Image Encryption and Decryption by Using Optical Scanning Cryptography Method
In this paper, a computer simulation of optical encryption for color images are presented based on the optical scanning cryptography technique that... -
An Enhanced D Level Cut-Off Point-Quantum Secret Sharing Access Structure Scheme Based Efficient Monitoring Key Ciphertext Attributes with Encryption Access Control with Blockchain and Key Mechanism for Security in Cloud Computing
Due to the exponential growth of cloud data and network services, computational resources and cloud data security have one of the most attractive...
-
Fuzzy logic and CPSO-optimized key management for secure communication in decentralized IoT networks: A lightweight solution
The act of implementing specific measures to ensure the security of cryptographic keys within an organization is referred to as key management....
-
RL-BLED: A Reversible Logic Design of Bit Level Encryption/Decryption Algorithm for Secure Mammogram Data Transmission
Security is an essential task while focusing on confidential level of patient information during medical data transmission. The image encryption...
-
An Advanced Encryption Standard in Memory (AESIM) Efficient, High Performance S-box Based AES Encryption and Decryption Architecture on VLSI
As CMOS(Complementary Metal Oxide Semiconductor) technology reaches its scaling threshold, evolving non-volatile memory approaches are becoming a...
-
A New Algorithm for Encryption and Decryption Using AUM Block Sum Labeling
The advantages of digital data are spreading throughout all industries in the modern world, and securing data while exchanging is extremely... -
An Effective Data Security Mechanism for Secured Data Communications Using Hybrid Cryptographic Technique and Quantum Key Distribution
One of the most flamboyant technological novelties of today's world is cloud computing, which has been fuelled by the increase in the number of smart...
-
A Decomposed Encryption-Decryption Scheme for Deception Attack Detection and Privacy-Preserving
This paper deals with the deception attack detection and privacy-preserving problem for the multi-agent systems with malicious attacks. First, a... -
SE-LAKAF: Security enhanced lightweight authentication and key agreement framework for smart grid network
The Smart Grid (SG) improves the reliability and efficiency of the data sharing and communication of the traditional power grid system. This...
-
Breaking Barriers in Conventional Cryptography by Integrating with Quantum Key Distribution
Security techniques based on conventional cryptography assume keys are disseminated prior to secure communications in traditional security...
-
Study on the Encryption and Decryption Capabilities of Hybrid Techniques for Images
Data plays an important role in modern life, and because more and more gadgets are connecting to the internet, the amount of data stored online is... -
Need of Hour: Hybrid Encryption and Decryption Standards (HEaDS) Algorithm for Data Security
With the significant advancements in information technology, a massive amount of data is being shared over the internet. And over the previous few... -
FPGA hardware acceleration of an improved chaos-based cryptosystem for real-time image encryption and decryption
This paper introduces a full **linx FPGA-Zynq implementation of a robust cryptosystem for real-time image encryption and decryption. Firstly, a...