scispace - formally typeset
Search or ask a question
Topic

Plaintext-aware encryption

About: Plaintext-aware encryption is a research topic. Over the lifetime, 1980 publications have been published within this topic receiving 101775 citations. The topic is also known as: Plaintext awareness.


Papers
More filters
Journal ArticleDOI
TL;DR: A new cryptographic primitive is introduced, named cloud‐aided revocable identity‐based encryption scheme with ciphertext update (CA‐RIBE‐CU), to achieve both cipher Text update and key revocation for identity‐ based encryption schemes.
Abstract: Summary Key revocation and ciphertext update are two critical issues for identity-based encryption schemes. Designing an identity-based encryption scheme with key revocation and ciphertext update functionalities simultaneously is still a tricky challenge. Recently, Liang et al. introduce the notion of cloud-based revocable identity-based proxy re-encryption scheme and present a concrete scheme with aim to solve the challenge. In this paper, we first showed the scheme of Liang et al. cannot resist re-encryption key forgery attack and collusion attack. We then introduced a new cryptographic primitive, named cloud-aided revocable identity-based encryption scheme with ciphertext update (CA-RIBE-CU), to achieve both ciphertext update and key revocation for identity-based encryption schemes. We also defined the syntax and security model of CA-RIBE-CU scheme and proposed a CA-RIBE-CU scheme from bilinear pairings. Compared with the scheme of Liang et al., our proposed scheme is collusion resistant, takes lower decryption computation, and achieves constant size re-encrypted ciphertext. Finally, we proved the proposed scheme is adaptively secure under the decisional bilinear Diffie–Hellman assumption in the standard model. Copyright © 2016 John Wiley & Sons, Ltd.

9 citations

Journal ArticleDOI
TL;DR: A chosen plaintext attack is presented for constructing all the private keys of cryptosystems based on array codes based onarray codes.
Abstract: A chosen plaintext attack is presented for constructing all the private keys of cryptosystems based on array codes.

9 citations

Journal Article
TL;DR: The results of the experimental shows that the encryption and decryption time of the proposed encryption algorithm REA has a very good performance compared to other encryption algorithms, and the correlation coefficient measure results depict that the proposed encryptor REA provides more security.
Abstract: provides strong security for databases. To develop a database encryption strategy, many factors must be taken into consideration. Organizations must balance between the requirement for security and the desire for excellent performance. In this paper a novel encryption algorithm is proposed "Reverse Encryption Algorithm (REA)". The proposed algorithm REA is simple and yet leads to a cipher. It has achieved security and is fast enough for most applications. REA algorithm is limiting the added time cost for encryption and decryption to not degrade the performance of a database system. Moreover, designing REA algorithm has enhanced security in data encryption. Besides, the secure and performance of the proposed encryption algorithm REA is evaluated and compare with the most common encryption algorithms. Experimental results show that the proposed encryption algorithm REA outperforms other encryption algorithms at performance and security in databases. Overall, the proposed encryption algorithm REA achieves balance between the security and the efficiency. This paper observes a method for evaluating the security and efficiency of the proposed encryption algorithm REA and compares with the most common encryption algorithms namely: DES, 3DES, RC2, AES and Blowfish. A comparison will be presented for those encryption algorithms for encryption and decryption times. Also, another comparison will be presented for the secure value (it is used to measure the information entropy). Furthermore, another measure of security is the correlation coefficient of encrypted fields with the proposed encryption algorithm REA. The results of the experimental shows that the encryption and decryption time of the proposed encryption algorithm REA has a very good performance compared to other encryption algorithms. The security measure (information entropy) results indicate that the proposed encryption algorithm REA and AES are more secure than DES, 3DES, RC2, and Blowfish. Also, the correlation coefficient measure results depict that the proposed encryption algorithm REA provides more security.

9 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Cryptography
37.3K papers, 854.5K citations
89% related
Public-key cryptography
27.2K papers, 547.7K citations
88% related
Hash function
31.5K papers, 538.5K citations
87% related
Key (cryptography)
60.1K papers, 659.3K citations
86% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202318
202230
20211
20202
20194
201822