Sign Up to like & get
recommendations!
1
Published in 2019 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-019-7155-x
Abstract: Digital certificate validation associated with traditional public key cryptosystems make it impractical in real-world environments due to their storage cost. The identity-based cryptosystems have been proven advantageous as they do not require any digital certificate…
read more here.
Keywords:
key;
private key;
identity based;
secure key ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "Science China Information Sciences"
DOI: 10.1007/s11432-018-9589-x
Abstract: Dear editor, With the rapid development of digital currencies and blockchain technologies, an increasing number of countries are planning to launch or have already launched their own central bank-issued digital currency (CBDC). In addition to…
read more here.
Keywords:
key;
private key;
digital signature;
two party ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3226319
Abstract: Colored digital images are one of the most important types of digital data to be used in many vital applications, which require a safe way to protect them from hacking operations and the danger of…
read more here.
Keywords:
system;
private key;
cryptographically secure;
encryption ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE transactions on neural networks and learning systems"
DOI: 10.1109/tnnls.2021.3062754
Abstract: The need for medical image encryption is increasingly pronounced, for example, to safeguard the privacy of the patients' medical imaging data. In this article, a novel deep learning-based key generation network (DeepKeyGen) is proposed as…
read more here.
Keywords:
medical image;
private key;
image encryption;
deepkeygen ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "Journal of Mathematical Cryptology"
DOI: 10.1515/jmc-2019-0015
Abstract: Abstract We analyze security properties of a two-party key-agreement protocol recently proposed by I. Anshel, D. Atkins, D. Goldfeld, and P. Gunnels, called Kayawood protocol. At the core of the protocol is an action (called…
read more here.
Keywords:
private keys;
private key;
protocol;
kayawood protocol ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "Entropy"
DOI: 10.3390/e19030100
Abstract: In this paper we introduce two normalized versions of non-perfect security for private-key encryption: one version in the framework of Shannon entropy, another version in the framework of Kolmogorov complexity. We prove the lower bound…
read more here.
Keywords:
key encryption;
private key;
security;
normalized unconditional ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "Entropy"
DOI: 10.3390/e24121716
Abstract: We extend the problem of secure source coding by considering a remote source whose noisy measurements are correlated random variables used for secure source reconstruction. The main additions to the problem are as follows: (1)…
read more here.
Keywords:
private key;
decoder;
source coding;
source ... See more keywords