scispace - formally typeset
Search or ask a question
Topic

Plaintext-aware encryption

About: Plaintext-aware encryption is a research topic. Over the lifetime, 1980 publications have been published within this topic receiving 101775 citations. The topic is also known as: Plaintext awareness.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper proposes an efficient TPKE scheme with constant-size ciphertexts and adaptive security, and proves security is proven under the decision Bilinear Diffie-Hellman Exponentiation assumption in the standard model.

22 citations

Journal ArticleDOI
TL;DR: This paper lays out a scheme for a two-level H.263-based video cryptosystem, which skillfully combines the traditional selective encryption algorithm with permutation and subsequent masking operation of the coded H. 263-based stream.
Abstract: Chaos-based video encryption algorithms are designed based on selective encryption method. Different from many prevailing MPEG-based video encryption designs, this paper lays out a scheme for a two-level H.263-based video cryptosystem, which skillfully combines the traditional selective encryption algorithm with permutation and subsequent masking operation of the coded H.263-based stream. Lastly, the implementation of the proposed cryptosystem on a local area network (LAN) strongly illustrates the efficiency and feasibility of the two-level chaos-based cryptosystem for practical use in many respects, including processing speed, compression ratio, quality of reconstructed image and security level.

22 citations

Book ChapterDOI
02 Dec 2009
TL;DR: A combinatorial property on the sets of predicates/attributes is identified and it is shown that, for any sets having this property, no black-box construction of predicate encryption from trapdoor permutations is possible.
Abstract: Predicate encryption is a recent generalization of identity-based encryption (IBE), broadcast encryption, attribute-based encryption, and more. A natural question is whether there exist black-box constructions of predicate encryption based on generic building blocks, e.g., trapdoor permutations. Boneh et al. (FOCS 2008) recently gave a negative answer for the specific case of IBE. We show both negative and positive results. First, we identify a combinatorial property on the sets of predicates/attributes and show that, for any sets having this property, no black-box construction of predicate encryption from trapdoor permutations (or even CCA-secure encryption) is possible. Our framework implies the result of Boneh et al. as a special case, and also rules out, e.g., black-box constructions of forward-secure encryption and broadcast encryption (with many excluded users). On the positive side, we identify conditions under which predicate encryption schemes can be constructed based on any CPA-secure (standard) encryption scheme.

22 citations

Journal ArticleDOI
TL;DR: The proposed scheme is found to be secure against known plaintext attack when encryption uses a different random key for every new plaintext.
Abstract: In this paper, we have developed a new ElGamal-like public key cryptosystem based on the matrices over a groupring. The underlying hard problem for this cryptosystem is the conjugacy search problem. That is, we have replaced the exponentiation of elements by conjugacy. This makes the key generation step more efficient. We also talk about different security aspects against known attacks. The proposed scheme is found to be secure against known plaintext attack when encryption uses a different random key for every new plaintext.

22 citations

Journal ArticleDOI
TL;DR: An efficient bit-plane encryption algorithm using chaotic, quadratic, and cubic maps based on the confusion, diffusion, and pixel randomisation processes that shows the strength of security in terms of information entropy, peak signal-to-noise ratio, number of pixels change rate, and correlation coefficient with the number of encrypted bit planes.
Abstract: Recently, in chaotic cryptography several new techniques have been suggested to develop efficient and secure image encryption algorithm for communication of image over insecure/public channels. Some of these techniques are computationally less complex but fails to provide sufficient security, and some techniques are though highly secured but increases computational overhead for encryption and decryption. This paper presents an efficient bit-plane encryption algorithm using chaotic, quadratic, and cubic maps. The proposed algorithm is based on the confusion, diffusion, and pixel randomisation processes. The encryption security of this technique for different bit-plane has been tested through key space analysis, statistical analysis, entropy analysis, and sensitivity analysis for real time image encryption and transmission. The presented algorithm shows the strength of security in terms of information entropy, peak signal-to-noise ratio (PSNR), number of pixels change rate (NPCR), unified average ch...

22 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Cryptography
37.3K papers, 854.5K citations
89% related
Public-key cryptography
27.2K papers, 547.7K citations
88% related
Hash function
31.5K papers, 538.5K citations
87% related
Key (cryptography)
60.1K papers, 659.3K citations
86% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202318
202230
20211
20202
20194
201822