Review of the use of human senses and capabilities in cryptography
Kimmo Halunen,Outi-Marja Latvala +1 more
TLDR
This paper reviews the previous research on utilizing human senses and capabilities in cryptography, and proposes several topics and problems that need to be solved in order to build cryptography that is more accessible to humans.About:
This article is published in Computer Science Review.The article was published on 2021-02-01 and is currently open access. It has received 9 citations till now. The article focuses on the topics: Key (cryptography) & Cryptography.read more
Citations
More filters
Journal ArticleDOI
Enhancement of Blockchain System in Online Transaction by Detecting Attacks using an Intelligent Approach
TL;DR: In this paper , the authors have introduced a blockchain-based deep network to predict malicious behavior to end these issues and implemented the planned work in the python frameworks, and the scalability of the developed model has been found in terms of encryption-decryption duration and the exactness score of attack detection.
Journal ArticleDOI
Secure Data Transmission Using Optimized Cryptography and Steganography Using Syndrome-Trellis Coding
Book ChapterDOI
Models-Based Analysis of Both User and Attacker Tasks: Application to EEVEHAC
Sara Nikula,Célia Martinie,Philippe Palanque,Julius Hekkala,Outi-Marja Latvala,Kimmo Halunen +5 more
Journal ArticleDOI
Paillier Cryptosystem Based ChainNode for Secure Electronic Voting
TL;DR: The scientific value of this study is the development of an integrity and privacy-preserving e-voting system consisting of an open-source nodechain coupled with a privacy-oriented cryptosystem known as the Paillier cryptos system following the security requirements of e-Voting systems.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI
How to share a secret
TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Book ChapterDOI
Identity-based cryptosystems and signature schemes
TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Journal ArticleDOI
On the security of public key protocols
Danny Dolev,Andrew Chi-Chih Yao +1 more
TL;DR: Several models are formulated in which the security of protocols can be discussed precisely, and algorithms and characterizations that can be used to determine protocol security in these models are given.
Book ChapterDOI
Fuzzy identity-based encryption
Amit Sahai,Brent Waters +1 more
TL;DR: In this article, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.