-
41
A Novel Color Image Encryption Algorithm Based on Hybrid Two-Dimensional Hyperchaos and Genetic Recombination
Published 2024-11-01“…The color picture encryption algorithm utilizing chaotic mapping is limited by a small chaotic range, unstable chaotic state, and lengthy encryption duration. …”
Get full text
Article -
42
Compressive sensing and DNA coding operation: Revolutionary approach to colour medical image compression‐encryption algorithm
Published 2024-12-01“…Finally, the regrouped bit planes help yield the compressed encrypted images. A comprehensive analysis of the proposed algorithm's encryption and decryption effectiveness, compression performance, and security was conducted. …”
Get full text
Article -
43
Enhancing smart healthcare networks: Integrating attribute-based encryption for optimization and anti-corruption mechanisms
Published 2025-01-01“…The ABE approach is then empirically compared to other prominent encryption algorithms, such as Identity-Based Encryption, Data Encryption Standard, Advanced Encryption Standard, and Rivest-Shamir-Adleman algorithms. …”
Get full text
Article -
44
Optimization method for attribute-based cryptographic access control in mobile cloud computing
Published 2018-07-01“…For the problem of secure data sharing and access control in mobile cloud,the drawback of traditional cryptographic access control schemes was deeply analyzed.Considering the truth that mobile devices were usually equipped with limited resources,an optimized attribute-based cryptographic access control scheme was proposed in this study.In the proposed scheme,a third party proxy was introduced into the system model,and the two-layer encryption method was applied.Combining traditional attribute-based encryption (ABE) algorithm with multi-secret sharing and split measurement of ABE encryption,the scheme could greatly reduce the cost of mobile users in terms of data publish and access management.Theoretical and experimental analysis shows that the contribution can well meet the requirements of mobile cloud in terms of security,computational complexity and communication cost,which means that it is promising for future applications.…”
Get full text
Article -
45
Implementing semiclassical Szegedy walks in classical-quantum circuits for homomorphic encryption
Published 2025-01-01“…This work delves into quantum homomorphic encryption (QHE), an emerging technology that facilitates secure computation on encrypted quantum data without revealing the underlying information. …”
Get full text
Article -
46
Adaptive encryption method of sensitive data in data center database based on big data cross-mapping fusion algorithm
Published 2025-08-01“…This approach transforms the serial operation structure of the AES algorithm into a parallel operation structure, enabling adaptive encryption of fusion sensitive data. …”
Get full text
Article -
47
Chaotic Image Encryption System as a Proactive Scheme for Image Transmission in FSO High-Altitude Platform
Published 2025-06-01“…This scheme effectively combines the chaotic image encryption algorithm with the atmospheric turbulence channel transmission process, improving the anti-interference capabilities and security of HAP optical communication for image transmission. …”
Get full text
Article -
48
A Secure Asymmetric Optical Image Encryption Based on Phase Truncation and Singular Value Decomposition in Linear Canonical Transform Domain
Published 2021-01-01“…A new asymmetric optical double image encryption algorithm is proposed, which combines phase truncation and singular value decomposition. …”
Get full text
Article -
49
Securing Electrical Drive Systems Against Man-in-the-Middle Attacks Using S-Box Optimized AES Encryption
Published 2025-01-01“…The optimized S-box is generated using the Differential Evolution (DE) algorithm for encrypting data within the communication network to mitigate data visibility. …”
Get full text
Article -
50
A high-entropy image encryption scheme using optimized chaotic maps with Josephus permutation strategy
Published 2025-08-01“…We suggest a novel image encryption algorithm based on chaotic maps and the variable-step Josephus problem to get over these restrictions and increase the encryption resilience. …”
Get full text
Article -
51
Square-Based Division Scheme for Image Encryption Using Generalized Fibonacci Matrices
Published 2025-05-01“…This paper proposes a novel image encryption and decryption scheme, called Square Block Division-Fibonacci (SBD-Fibonacci), which dynamically partitions any input image into optimally sized square blocks to enable efficient encryption without resizing or distortion. …”
Get full text
Article -
52
A New Approach Combining RSA and ElGamal Algorithms: Advancements in Encryption and Digital Signatures Using Gaussian Integers
Published 2025-03-01“…This article introduces a novel approach that integrates the ElGamal and RSA algorithms to advance the security and efficiency of public-key cryptosystems. …”
Get full text
Article -
53
Security-Enhanced Image Encryption: Combination of S-Boxes and Hyperchaotic Integrated Systems
Published 2025-01-01“…A three-step diffusion mechanism is adopted in the encryption process, and the S-boxes obtained from the search of the particle swarm optimization algorithm are fully integrated with the chaotic sequences generated by the hyperchaotic integrated system in the first two steps of diffusion to improve the security and randomness of the encryption algorithm. …”
Get full text
Article -
54
Prediction Algorithm of Key Design Parameters for Space Chaotic Optical Communication System
Published 2020-01-01Get full text
Article -
55
Convolutional neural network model over encrypted data based on functional encryption
Published 2024-03-01“…Currently, homomorphic encryption, secure multi-party computation, and other encryption schemes are used to protect the privacy of sensitive data in outsourced convolutional neural network (CNN) models.However, the computational and communication overhead caused by the above schemes would reduce system efficiency.Based on the low cost of functional encryption, a new convolutional neural network model over encrypted data was constructed using functional encryption.Firstly, two algorithms based on functional encryption were designed, including inner product functional encryption and basic operation functional encryption algorithms to implement basic operations such as inner product, multiplication, and subtraction over encrypted data, reducing computational and communication costs.Secondly, a secure convolutional computation protocol and a secure loss optimization protocol were designed for each of these basic operations, which achieved ciphertext forward propagation in the convolutional layer and ciphertext backward propagation in the output layer.Finally, a secure training and classification method for the model was provided by the above secure protocols in a module-composable way, which could simultaneously protect the confidentiality of user data as well as data labels.Theoretical analysis and experimental results indicate that the proposed model can achieve CNN training and classification over encrypted data while ensuring accuracy and security.…”
Get full text
Article -
56
Hybrid blowfish cryptography with elliptic curve Diffie-Hellman key exchange protocol for enhancing data security and performance
Published 2025-05-01“…The implementation was carried out using MATLAB tool, ensuring reliable evaluation of encryption and decryption performance. The research work ensures optimal performance at a rate of 28.57% and also improved security standard of 33.33% compared to the traditional algorithms.…”
Get full text
Article -
57
Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage
Published 2024-09-01“…The access tree was enhanced with node information for fine-grained control over ciphertext read and write permissions. The keyword encryption process was optimized for trapdoor indistinguishability and restricted user search capabilities. …”
Get full text
Article -
58
Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage
Published 2024-09-01“…The access tree was enhanced with node information for fine-grained control over ciphertext read and write permissions. The keyword encryption process was optimized for trapdoor indistinguishability and restricted user search capabilities. …”
Get full text
Article -
59
Research on the Trusted Traceability Model of Taishan Tea Products Based on Blockchain
Published 2024-11-01“…In order to solve this problem, this paper proposes a trusted traceability model for Taishan tea based on blockchain technology, which utilizes blockchain technology and data hierarchical uploading mechanism to ensure data accuracy and transparency, and, at the same time, improves data uploading efficiency. The optimized SM2 encryption algorithm is introduced, and the execution efficiency of the encryption algorithm is improved by the concurrent processing framework, which guarantees the security and transmission speed of the data. …”
Get full text
Article -
60
Individual health passport storage, sharing and verification scheme based on blockchain
Published 2024-04-01“…The scheme also refined the weak consensus mechanism, with an improved algorithm that achieved consensus in merely two stages. …”
Get full text
Article