On-the-fly encryption
View article
A Survey on Homomorphic Encryption Schemes Open
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns. The users or service providers with the key have exclusive ri…
View article
SIT: A Lightweight Encryption Algorithm for Secure Internet of Things Open
The Internet of Things (IoT) being a promising technology of the future is\nexpected to connect billions of devices. The increased number of communication\nis expected to generate mountains of data and the security of data can be a\nthreat…
View article
Cryptanalyzing an Image-Scrambling Encryption Algorithm of Pixel Bits Open
Position scrambling (permutation) is widely used in multimedia encryption schemes and some international encryption standards, such as the Data Encryption Standard and the Advanced Encryption Standard. In this article, the authors re-evalu…
View article
A Secure and Efficient Lightweight Symmetric Encryption Scheme for Transfer of Text Files between Embedded IoT Devices Open
Recent advancements in wireless technology have created an exponential rise in the number of connected devices leading to the internet of things (IoT) revolution. Large amounts of data are captured, processed and transmitted through the ne…
View article
A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption Open
This article proposes a novel encryption schema based on Elliptic Curve Cyrptography (ECC) and homomorphic encryption to secure data transmission in wireless sensor networks.
View article
Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things Open
Fog computing is a paradigm that extends cloud computing to the edge of the network. It can provide computation and storage services to end devices in Internet of Things (IoT). Attribute-based cryptography is a well-known technology to gua…
View article
A Survey on the Cryptographic Encryption Algorithms Open
Security is the major concern when the sensitive information is stored and transferred across the internet where the information is no longer protected by physical boundaries. Cryptography is an essential, effective and efficient component…
View article
Homomorphic Encryption for Security of Cloud Data Open
Cloud computing is a broad and diverse phenomenon. Users are allowed to store large amount of data on cloud storage for future use. The various security issues related to data security, privacy, confidentiality, integrity and authenticatio…
View article
Efficient Dynamic Searchable Encryption with Forward Privacy Open
Searchable symmetric encryption (SSE) enables a client to perform searches over its outsourced encrypted files while preserving privacy of the files and queries. Dynamic schemes, where files can be added or removed, leak more information t…
View article
Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud Open
\n With\n the rapid development of cloud computing, an increasing number of individuals\n and organizations are sharing data in the public cloud. To protect the\n privacy of data stored in the cloud, a data owner usually encrypts his data\…
View article
Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks Open
The industrial Internet of Things is flourishing, which is unprecedentedly driven by the rapid development of wireless sensor networks (WSNs) with the assistance of cloud computing. The new wave of technology will give rise to new risks to…
View article
BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing Open
Cloud computing facilitates the storage and management of huge volumes of data. It offers flexibility for retrieving the data anytime and anywhere. In recent years, storing data onto the cloud achieved fame among corporations as well as pr…
View article
A Content-Adaptive Joint Image Compression and Encryption Scheme Open
For joint image compression and encryption schemes, the encryption power and compression efficiency are commonly two contradictory things. In this paper, we propose a new joint image compression and encryption scheme based on a lossy JPEG …
View article
Privacy-Preserving Data Processing with Flexible Access Control Open
Cloud computing provides an efficient and convenient platform for cloud users to store, process and control their data. Cloud overcomes the bottlenecks of resource-constrained user devices and greatly releases their storage and computing b…
View article
How to build time-lock encryption Open
Time-lock encryption is a method to encrypt a message such that it can only be decrypted after a certain deadline has passed. We propose a novel time-lock encryption scheme, whose main advantage over prior constructions is that even receiv…
View article
Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography Open
Organizations share an evolving interest in adopting a cloud computing approach for Internet of Things (IoT) applications. Integrating IoT devices and cloud computing technology is considered as an effective approach to storing and managin…
View article
Secure searchable encryption: a survey Open
Cloud computing facilitates convenient and on-demand network access to a centralized pool of resources. Currently, many users prefer to outsource data to the cloud in order to mitigate the burden of local storage. However, storing sensitiv…
View article
On the Feasibility of Attribute-Based Encryption on Smartphone Devices Open
Attribute-Based Encryption (ABE) is a powerful cryptographic tool that allows fine-grained access control over data. Due to its features, ABE has been adopted in several applications, such as encrypted storage or access control systems. Re…
View article
Revocable Quantum Timed-Release Encryption Open
Timed-release encryption is a kind of encryption scheme in which a recipient can decrypt only after a specified amount of time T (assuming that we have a moderately precise estimate of his computing power). A revocable timed-release encryp…
View article
Ciphertext-Policy Attribute-Based Encryption for Cloud Storage: Toward Data Privacy and Authentication in AI-Enabled IoT System Open
People can store their data on servers in cloud computing and allow public users to access data via data centers. One of the most difficult tasks is to provide security for the access policy of data, which is also needed to be stored at cl…
View article
Computational Image Encryption Techniques: A Comprehensive Review Open
Images contain very sensitive and confidential information. Because images play a significant role in many applications such as military communication, remote-sensing, and medical-imaging, therefore, it is necessary to protect sensitive an…
View article
Hybrid Lightweight Proxy Re-Encryption Scheme for Secure Fog-to-Things Environment Open
Fog computing is a promising paradigm that can mitigate the heavy burden on cloud-central processing of the vast amount of IoT data. Although fog computing has the advantages of low latency, storage, and computing resources that serve IoT …
View article
Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms Open
Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption Standard (AES) algorithm, cannot perform computational operations on encrypted dat…
View article
Chaotic Lightweight Cryptosystem for Image Encryption Open
Data transmission over the Internet and the personal network has been risen day by day due to the advancement of multimedia technology. Hence, it is today’s prime concern to protect the data from unauthorized access and encrypt the multime…
View article
Dynamic Encrypted Data Sharing Scheme Based on Conditional Proxy Broadcast Re-Encryption for Cloud Storage Open
Since Cloud Service Provider is a semi-trusted party in cloud storage, to protect data from being disclosed, users' data are encrypted before being uploaded to a cloud server. Undoubtedly, flexible encrypted data sharing is a very importan…
View article
A Selective Video Encryption Scheme Based on Coding Characteristics Open
The protection of video data has become a hot topic of research. Researchers have proposed a series of coding algorithms to ensure the safe and efficient transmission of video information. We propose an encryption scheme that can protect v…
View article
Multimedia Security Using Encryption: A Survey Open
Considering the current dependency on digital technology in modern society, the protection of multimedia is highly important. Encryption is vital in modern digital communication, ensuring data confidentiality, authentication, integrity, an…
View article
Analysis And Design of File Security System AES (Advanced Encryption Standard) Cryptography Based Open
The times has made human needs are increasing, including information needs. Therefore, sending and storing data through electronic media requires a process that is able to guarantee the security and integrity of the data that requires an e…
View article
Homomorphic Encryption Technology for Cloud Computing Open
Four kinds of single homomorphic encryption algorithm were summarized for the advantages of homomorphic encryption technology in the cloud environment. It analyzed the security characteristics of four kinds of encryption algorithms. On the…
View article
Offline privacy preserving proxy re-encryption in mobile cloud computing Open
This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based pro…