scispace - formally typeset
Search or ask a question
Topic

Plaintext-aware encryption

About: Plaintext-aware encryption is a research topic. Over the lifetime, 1980 publications have been published within this topic receiving 101775 citations. The topic is also known as: Plaintext awareness.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper describes an efficient and collusion-resistant thABE scheme featuring dynamically-specifiable threshold values and is proven secure in the random oracle model, and its efficiency and flexibility are compared with Sahai and Waters' ABE scheme.
Abstract: Threshold attribute-based encryption (thABE) is a variant of identity-based encryption which views identities as sets of descriptive attributes. If a thABE ciphertext c is computed for a set ω of attributes, then, to decrypt c, a user must have keys associated with a sufficiently large subset of ω. One application of thABE is biometric-based access control (BBAC). Practical BBAC applications impose the following constraints on the design of thABE schemes: first, a suitable thABE scheme must have an efficient decryption procedure; second, the proposed scheme must prevent colluding users from being able to decrypt ciphertexts which none of them could decrypt; third, the designed scheme must provide a mechanism whereby encryptors can, at encryption time, specify multiples sets of attributes with their corresponding threshold values. To the best of our knowledge, no scheme is known that simultaneously satisfies the aforementioned requirements. This paper describes an efficient and collusion-resistant thABE scheme featuring dynamically-specifiable threshold values. The proposed scheme is proven secure in the random oracle model, and its efficiency and flexibility are compared with Sahai and Waters'thABE scheme.

36 citations

Book ChapterDOI
14 Sep 1998
TL;DR: In this paper, an efficient verifiable encryption scheme for discrete logarithm was proposed and proved to be secure for e-th roots, which is a special case of our scheme.
Abstract: A verifiable encryption scheme (VES) is useful for many cryptographic protocols. A VES may be either for (encryption of) discrete logarithms or for (encryption of) e-th roots. So far, all the VESs for discrete logarithms are inefficient, but there exists an efficient VES for e-th roots. In this paper, we presents an efficient VES for discrete logarithms and prove its security.

36 citations

Patent
21 Apr 2010
TL;DR: In this paper, a method and system for generating ciphertext message data and message authentication codes utilizing shared hardware is described, where the plaintext message is received at an authenticated encryption unit which comprises first and second authenticated encryption hardware modules.
Abstract: A method and system for generating ciphertext and message authentication codes utilizing shared hardware are disclosed. According to one embodiment, a method is provided of generating ciphertext message data and message authentication codes utilizing shared authenticated encryption unit hardware. In the described embodiment, plaintext message data is received at an authenticated encryption unit which comprises first and second authenticated encryption hardware modules. Thereafter, a first message authentication code (MAC) associated with a first authenticated encryption mode and a second MAC associated with a second authenticated encryption mode are generated. More specifically, the first MAC is generated utilizing the plaintext message data and first authenticated encryption hardware module and ciphertext message data and the second MAC are generated utilizing the plaintext message data and second authenticated encryption hardware module.

36 citations

Journal ArticleDOI
TL;DR: A cryptosystem for secure communication between computers using synchronisation of discrete-time chaotic systems that employs a one-time pad encryption where each message block of M bits is encrypted using a unique set of secret keys that is self-generated within the system.

35 citations

Journal ArticleDOI
TL;DR: A novel optical encryption technique based on two beam interference principle and phase truncation approach is presented which offers higher level of security as it resists the specific attack on asymmetric cryptosystem and is robust against occlusion attack.
Abstract: In this paper, a novel optical encryption technique based on two beam interference principle and phase truncation approach is presented The proposed scheme is compact, highly secure, and suitable for securing multiple images Simulation results with three different images have been presented The first two images to be encrypted are encoded into two parts One is phase-only distribution and other is amplitude mask The amplitude masks are preserved as decryption keys while phase distribution is used as encryption keys in order to encrypt the third image using phase-truncation approach The proposed scheme offers higher level of security as it resists the specific attack on asymmetric cryptosystem and is robust against occlusion attack Also, detailed study has been carried out employing keys which are dependent on and independent of the input image

35 citations


Network Information
Related Topics (5)
Encryption
98.3K papers, 1.4M citations
90% related
Cryptography
37.3K papers, 854.5K citations
89% related
Public-key cryptography
27.2K papers, 547.7K citations
88% related
Hash function
31.5K papers, 538.5K citations
87% related
Key (cryptography)
60.1K papers, 659.3K citations
86% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202318
202230
20211
20202
20194
201822