scispace - formally typeset
Open AccessJournal ArticleDOI

Review of the use of human senses and capabilities in cryptography

TLDR
This paper reviews the previous research on utilizing human senses and capabilities in cryptography, and proposes several topics and problems that need to be solved in order to build cryptography that is more accessible to humans.
About
This article is published in Computer Science Review.The article was published on 2021-02-01 and is currently open access. It has received 9 citations till now. The article focuses on the topics: Key (cryptography) & Cryptography.

read more

Citations
More filters
Journal ArticleDOI

Enhancement of Blockchain System in Online Transaction by Detecting Attacks using an Intelligent Approach

TL;DR: In this paper , the authors have introduced a blockchain-based deep network to predict malicious behavior to end these issues and implemented the planned work in the python frameworks, and the scalability of the developed model has been found in terms of encryption-decryption duration and the exactness score of attack detection.
Journal ArticleDOI

Paillier Cryptosystem Based ChainNode for Secure Electronic Voting

TL;DR: The scientific value of this study is the development of an integrity and privacy-preserving e-voting system consisting of an open-source nodechain coupled with a privacy-oriented cryptosystem known as the Paillier cryptos system following the security requirements of e-Voting systems.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Book ChapterDOI

Identity-based cryptosystems and signature schemes

TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Journal ArticleDOI

On the security of public key protocols

TL;DR: Several models are formulated in which the security of protocols can be discussed precisely, and algorithms and characterizations that can be used to determine protocol security in these models are given.
Book ChapterDOI

Fuzzy identity-based encryption

TL;DR: In this article, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Related Papers (5)