Topic
Plaintext-aware encryption
About: Plaintext-aware encryption is a research topic. Over the lifetime, 1980 publications have been published within this topic receiving 101775 citations. The topic is also known as: Plaintext awareness.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: This paper describes an efficient and collusion-resistant thABE scheme featuring dynamically-specifiable threshold values and is proven secure in the random oracle model, and its efficiency and flexibility are compared with Sahai and Waters' ABE scheme.
Abstract: Threshold attribute-based encryption (thABE) is a variant of identity-based encryption which views identities as sets of descriptive attributes. If a thABE ciphertext c is computed for a set ω of attributes, then, to decrypt c, a user must have keys associated with a sufficiently large subset of ω. One application of thABE is biometric-based access control (BBAC). Practical BBAC applications impose the following constraints on the design of thABE schemes: first, a suitable thABE scheme must have an efficient decryption procedure; second, the proposed scheme must prevent colluding users from being able to decrypt ciphertexts which none of them could decrypt; third, the designed scheme must provide a mechanism whereby encryptors can, at encryption time, specify multiples sets of attributes with their corresponding threshold values. To the best of our knowledge, no scheme is known that simultaneously satisfies the aforementioned requirements. This paper describes an efficient and collusion-resistant thABE scheme featuring dynamically-specifiable threshold values. The proposed scheme is proven secure in the random oracle model, and its efficiency and flexibility are compared with Sahai and Waters'thABE scheme.
36 citations
••
14 Sep 1998
TL;DR: In this paper, an efficient verifiable encryption scheme for discrete logarithm was proposed and proved to be secure for e-th roots, which is a special case of our scheme.
Abstract: A verifiable encryption scheme (VES) is useful for many cryptographic protocols. A VES may be either for (encryption of) discrete logarithms or for (encryption of) e-th roots. So far, all the VESs for discrete logarithms are inefficient, but there exists an efficient VES for e-th roots. In this paper, we presents an efficient VES for discrete logarithms and prove its security.
36 citations
•
IBM1
TL;DR: In this paper, a method and system for generating ciphertext message data and message authentication codes utilizing shared hardware is described, where the plaintext message is received at an authenticated encryption unit which comprises first and second authenticated encryption hardware modules.
Abstract: A method and system for generating ciphertext and message authentication codes utilizing shared hardware are disclosed. According to one embodiment, a method is provided of generating ciphertext message data and message authentication codes utilizing shared authenticated encryption unit hardware. In the described embodiment, plaintext message data is received at an authenticated encryption unit which comprises first and second authenticated encryption hardware modules. Thereafter, a first message authentication code (MAC) associated with a first authenticated encryption mode and a second MAC associated with a second authenticated encryption mode are generated. More specifically, the first MAC is generated utilizing the plaintext message data and first authenticated encryption hardware module and ciphertext message data and the second MAC are generated utilizing the plaintext message data and second authenticated encryption hardware module.
36 citations
••
TL;DR: A cryptosystem for secure communication between computers using synchronisation of discrete-time chaotic systems that employs a one-time pad encryption where each message block of M bits is encrypted using a unique set of secret keys that is self-generated within the system.
35 citations
••
TL;DR: A novel optical encryption technique based on two beam interference principle and phase truncation approach is presented which offers higher level of security as it resists the specific attack on asymmetric cryptosystem and is robust against occlusion attack.
Abstract: In this paper, a novel optical encryption technique based on two beam interference principle and phase truncation approach is presented The proposed scheme is compact, highly secure, and suitable for securing multiple images Simulation results with three different images have been presented The first two images to be encrypted are encoded into two parts One is phase-only distribution and other is amplitude mask The amplitude masks are preserved as decryption keys while phase distribution is used as encryption keys in order to encrypt the third image using phase-truncation approach The proposed scheme offers higher level of security as it resists the specific attack on asymmetric cryptosystem and is robust against occlusion attack Also, detailed study has been carried out employing keys which are dependent on and independent of the input image
35 citations