Secure Integration of Asymmetric and Symmetric Encryption Schemes
Author: Eiichiro Fujisaki and Tatsuaki Okamoto
*Wait a few seconds for the document to load, the time may vary depending on your internet connection. If you prefer, you can download the file by clicking on the link below.
Information
Description: Secure Integration of Asymmetric and Symmetric Encryption Schemes por Eiichiro Fujisaki and Tatsuaki Okamoto presents a method to combine weak encryption schemes into a stronger one, achieving indistinguishability against adaptive chosen-ciphertext attacks. This conversion is efficient and can be applied to encryption schemes like ElGamal, offering improved security.
Pages: 18
Megabytes: 0.26 MB
This may interest you
Obfuscation for Cryptographic Purposes
Extension: PDF | 27 pages
Obfuscation for Cryptographic Purposes por Dennis Hofheinz, John Malone-Lee and Martijn Stam introduces a new definition of obfuscation, arguing for its reasonability and usefulness in cryptographic applications. It shows potential positive results while considering limitations, making it a valuable resource for those studying obfuscation.
Asymmetric Cryptography and Practical Security
Extension: PDF | 26 pages
Asymmetric Cryptography and Practical Security by David Pointcheval explores the evolution and current state of asymmetric cryptography, focusing on provable security and practical schemes. It covers digital signatures and public-key encryption, making it a valuable resource for understanding modern cryptographic protocols.
Securely Obfuscating Re-encryption
Extension: PDF | 20 pages
Securely Obfuscating Re-encryption por Susan Hohenberger, Guy N. Rothblum, Abhi shelat and Vinod Vaikuntanathan introduces the first positive obfuscation result for a traditional cryptographic functionality: re-encryption. This work presents an efficient program obfuscator for a family of circuits implementing re-encryption.
Hybrid Cryptography for Cloud Security: Methodologies and Designs
Extension: PDF | 13 pages
Hybrid Cryptography for Cloud Security: Methodologies and Designs by Sherief H. Murad and Kamel Hussein Rahouma explores hybrid cryptography for cloud security, surveying models between 2013-2020. This paper presents design methodologies and implementation, highlighting limitations and applications, making it a valuable resource for understanding cloud security.
A novel symmetric hybrid cryptography technique using linear block cipher (lbc) and simple symmetric key
Extension: PDF | 11 pages
A novel symmetric hybrid cryptography technique using linear block cipher (lbc) and simple symmetric key by Prakash Kuppuswamy and Saeed Q Al-Khalidi Al-Maliki presents an innovative approach to data encryption by combining enhanced hill cipher and modulo 37. This hybrid method offers improved security, speed, and privacy compared to existing encryption schemes, making it a valuable read for cryptography enthusiasts.