scispace - formally typeset
Search or ask a question
Topic

40-bit encryption

About: 40-bit encryption is a research topic. Over the lifetime, 5434 publications have been published within this topic receiving 149016 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: A new efficient framework named Constant-size Ciphertext Policy Comparative Attribute-Based Encryption (CCP-CABE) with the support of negative attributes and wildcards that embeds the comparable attribute ranges of all the attributes into the user's key, and incorporates the attribute constraints into one piece of ciphertext during the encryption process to enforce flexible access control policies with various range relationships.
Abstract: With the proliferation of mobile devices in recent years, there is a growing concern regarding secure data storage, secure computation, and fine-grained access control in data sharing for these resource-constrained devices in a cloud computing environment. In this work, we propose a new efficient framework named Constant-size Ciphertext Policy Comparative Attribute-Based Encryption (CCP-CABE) with the support of negative attributes and wildcards. It embeds the comparable attribute ranges of all the attributes into the user’s key, and incorporates the attribute constraints of all the attributes into one piece of ciphertext during the encryption process to enforce flexible access control policies with various range relationships. Accordingly, CCP-CABE achieves the efficiency because it generates constant-size keys and ciphertext regardless of the number of involved attributes, and it also keeps the computation cost constant on lightweight mobile devices. We further discuss how to extend CCP-CABE to fit a scenario with multiple attribute domains, such that the decryption proceeds from the least privileged attribute domain to the most privileged one to help protect the privacy of the access policy. We provide security analysis and performance evaluation to demonstrate their efficiency at the end.

53 citations

Patent
31 Jan 2007
TL;DR: In this article, a system for providing a Virtual Local Area Network (VLAN) by use of encryption states or encryption keys for identifying a VLAN is presented, where a table of data including a Vlan and an associated encryption state or key is provided for assignment of encryption state for devices in a wireless local area network.
Abstract: In an example embodiment, a system for providing a Virtual Local Area Network (VLAN) by use of encryption states or encryption keys for identifying a VLAN. A table of data including a VLAN and an associated encryption state or key is provided for assignment of encryption states or keys, for devices in a wireless local area network.

53 citations

Book ChapterDOI
30 Nov 2004
TL;DR: A novel image encryption scheme based on JPEG2000 is proposed, which encrypts some sensitive frequency subbands, bit-planes or encoding-passes selectively and partially, and is secure against such attack as known-plaintext attack or replacement attack.
Abstract: In this paper, a novel image encryption scheme based on JPEG2000 is proposed, which encrypts some sensitive frequency subbands, bit-planes or encoding-passes selectively and partially It is secure against such attack as known-plaintext attack or replacement attack It is of low cost, keeps file format and compression ratio unchanged, supports direct bit-rate control, and does not degrade the original error-robustness These properties make it suitable for real-time applications with direct bit-rate control requirement, such as web imaging, image communication, mobile or wireless multimedia, and so on

53 citations

Journal ArticleDOI
Walter Leonard Tuchman1
TL;DR: Prof. Martin Hellman presents no shortcut solutions to the Data Encryption Standard; the time-memory tradeoff is just one of many key-message exhaustion techniques.
Abstract: Prof. Martin Hellman presents no shortcut solutions to the Data Encryption Standard; the time-memory tradeoff is just one of many key-message exhaustion techniques. Therefore when he says, ?DES is only marginally secure today and will be totally insecure within ten years,? he is totally wrong.

53 citations

Journal ArticleDOI
TL;DR: This paper proposes a general transformation from ABE to Attribute Based Encryption with Keyword Search (ABEKS) and a concrete attribute private key-policy ABE (KP-ABE) scheme and presents an ABEKS scheme, which will permit multi-users to execute a flexible search on the remote encrypted data.

53 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Cryptography
37.3K papers, 854.5K citations
89% related
Authentication
74.7K papers, 867.1K citations
86% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
81% related
Wireless ad hoc network
49K papers, 1.1M citations
80% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202370
2022145
20213
20205
20194