scispace - formally typeset
Search or ask a question
Topic

Plaintext-aware encryption

About: Plaintext-aware encryption is a research topic. Over the lifetime, 1980 publications have been published within this topic receiving 101775 citations. The topic is also known as: Plaintext awareness.


Papers
More filters
Proceedings ArticleDOI
01 Oct 2016
TL;DR: A novel image encryption algorithm based on two sets of one-dimensional logistic mappings that can provide satisfactory encryption results and the encrypted images are able to resist exhaustive, statistical and differential attacks.
Abstract: In the area of image encryption, a large number of algorithms have been developed to encrypt digital images using chaotic systems. The security of these encryption algorithms is usually limited due to the relatively small key spaces of the underlying chaotic systems used for encryption, especially in cases where the used chaotic systems are one-dimensional. In this paper, we develop a novel image encryption algorithm based on two sets of one-dimensional logistic mappings. The pixels in the original image are scrambled based on the logistic mappings in one set. The gray value of each pixel in the scrambled image is then changed by using two XOR operators and the logistic mappings in the other set. Analysis and Testing results show that this image encryption algorithm can provide satisfactory encryption results and the encrypted images are able to resist exhaustive, statistical and differential attacks.

11 citations

Journal ArticleDOI
TL;DR: A black-box construction of Pass, Shelat and Vaikuntanathan as mentioned in this paper achieves a quasi-linear blow-up in the size of the ciphertext of any semantically secure encryption scheme.
Abstract: We show how to transform any semantically secure encryption scheme into a non-malleable one, with a black-box construction that achieves a quasi-linear blow-up in the size of the ciphertext. This improves upon the previous non-black-box construction of Pass, Shelat and Vaikuntanathan (Crypto '06). Our construction also extends readily to guarantee non-malleability under a bounded-CCA2 attack, thereby simultaneously improving on both results in the work of Cramer et al. (Asiacrypt '07). Our construction departs from the oft-used paradigm of re-encrypting the same message with different keys and then proving consistency of encryption. Instead, we encrypt an encoding of the message; the encoding is based on an error-correcting code with certain properties of reconstruction and secrecy from partial views, satisfied, e.g., by a Reed---Solomon code.

11 citations

Book ChapterDOI
25 Feb 2014
TL;DR: This work reformalize and recast dual-receiver encryption (DRE) proposed in CCS ’04, and defines the crucial soundness property for DRE, which ensures that two recipients will get the same decryption result.
Abstract: We reformalize and recast dual-receiver encryption (DRE) proposed in CCS ’04, a public-key encryption (PKE) scheme for encrypting to two independent recipients in one shot. We start by defining the crucial soundness property for DRE, which ensures that two recipients will get the same decryption result. While conceptually simple, DRE with soundness turns out to be a powerful primitive for various goals for PKE, such as complete non-malleability (CNM) and plaintext-awareness (PA). We then construct practical DRE schemes without random oracles under the Bilinear Decisional Diffie-Hellman assumption, while prior approaches rely on random oracles or inefficient non-interactive zero-knowledge proofs. Finally, we investigate further applications or extensions of DRE, including DRE with CNM, combined use of DRE and PKE, strengthening two types of PKE schemes with plaintext equality test, off-the-record messaging with a stronger notion of deniability, etc.

11 citations

Journal ArticleDOI
TL;DR: P Puzzle is presented, which was inspired by the children game jigsaw puzzle, and comprises two simple encryption operations with low computational complexity: puzzling and obscuring, which dramatically reduces the encryption overhead compared to conventional encryption algorithms, such as AES.
Abstract: Real-time video streams require an efficient encryption method to ensure their confidentiality. One of the major challenges in designing a video encryption algorithm is to encrypt the vast amount of video data in real-time to satisfy the stringent time requirements. Video encryption algorithms can be classified according to their association with video compression into joint compression and encryption algorithms and compression-independent encryption algorithms. The latter have a clear advantage over the former regarding the incorporation into existing multimedia systems due to their independence of the video compression. In this paper we present the compression-independent video encryption algorithm Puzzle, which was inspired by the children game jigsaw puzzle. It comprises two simple encryption operations with low computational complexity: puzzling and obscuring. The scheme thereby dramatically reduces the encryption overhead compared to conventional encryption algorithms, such as AES, especially for high resolution video. Further outstanding features of Puzzle are a good trade-off between security demands and encryption efficiency, no impairment on video compression efficiency, and an easy integration into existing multimedia systems. This makes Puzzle particularly well-suited for these security-sensitive multimedia applications, such as videoconferencing, where maximal security and minimal encryption overhead are desired simultaneously.

11 citations

Patent
Isamu Teranishi1
17 May 2012
TL;DR: An order-preserving encryption system has an encryption means which generates a ciphertext as a sum of data which complies with a distribution X determined in advance, and the encryption means generates the ciphertext using the distribution X represented in a format that data of a bit length determined at random is selected at random according to a distribution matching the bit length as mentioned in this paper.
Abstract: An order-preserving encryption system has an encryption means which generates a ciphertext as a sum of data which complies with a distribution X determined in advance, and the encryption means generates the ciphertext using the distribution X represented in a format that data of a bit length determined at random is selected at random according to a distribution matching the bit length.

11 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Cryptography
37.3K papers, 854.5K citations
89% related
Public-key cryptography
27.2K papers, 547.7K citations
88% related
Hash function
31.5K papers, 538.5K citations
87% related
Key (cryptography)
60.1K papers, 659.3K citations
86% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202318
202230
20211
20202
20194
201822