Showing 41 - 60 results of 187 for search 'optimal encryption algorithm', query time: 0.06s Refine Results
  1. 41

    Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage by ZHANG Kejun, WANG Wenbin, XU Shaofei, YU Xinying, WANG Jun, LI Pengcheng, QIAN Rong

    Published 2024-09-01
    “…The access tree was enhanced with node information for fine-grained control over ciphertext read and write permissions. The keyword encryption process was optimized for trapdoor indistinguishability and restricted user search capabilities. …”
    Get full text
    Article
  2. 42

    Research on the Trusted Traceability Model of Taishan Tea Products Based on Blockchain by Kangchen Liu, Pingzeng Liu, Shuaishuai Gao

    Published 2024-11-01
    “…In order to solve this problem, this paper proposes a trusted traceability model for Taishan tea based on blockchain technology, which utilizes blockchain technology and data hierarchical uploading mechanism to ensure data accuracy and transparency, and, at the same time, improves data uploading efficiency. The optimized SM2 encryption algorithm is introduced, and the execution efficiency of the encryption algorithm is improved by the concurrent processing framework, which guarantees the security and transmission speed of the data. …”
    Get full text
    Article
  3. 43

    Individual health passport storage, sharing and verification scheme based on blockchain by GAO Hancheng, JI Haoyu, GAO Chenhao, HUANG Haiping

    Published 2024-04-01
    “…The scheme also refined the weak consensus mechanism, with an improved algorithm that achieved consensus in merely two stages. …”
    Get full text
    Article
  4. 44

    SCAN-C: a lightweight cryptographic algorithm to secure CAN communications in modern vehicles by Nagaraj Hediyal, B. P. Divakar, K. Narayanaswamy

    Published 2025-07-01
    “…The decryption schedule is the same as the encryption, with keys applied in reverse order. The innovative architecture of SCAN-C exhibits low consumption of resources (1197 gate equivalents to implement in hardware), better security with low iterative rounds, and optimal energy efficiency. …”
    Get full text
    Article
  5. 45

    Research on the security of national secret algorithm based compute first networking by Jie PAN, Lan YE, Pengfei ZHANG, Zhonggui BU

    Published 2023-08-01
    “…With the promotion of national secret algorithm, in-depth research on the arithmetic network was carried out, a more efficient and reasonable security scheme for the arithmetic network was proposed, ensuring the data security and privacy of the arithmetic network with the help of the state secret algorithm.The main elements of the design program included: Supporting arithmetic demand and cryptographic invocation through the underlying resources, the arithmetic orchestration layer provided the ability to orchestrate data arithmetic, meanwhile, the arithmetic scheduling layer intelligently discerned the optimal nodes for arithmetic resource scheduling and allocation; the cryptographic reinforcement layer used the national secret algorithm based on hardware support with the help of public key cryptosystem, hash function, digital envelope, homomorphic encryption, blockchain and other technologies.Focusing on arithmetic network access security, transmission security, data security and privacy protection aspects of security implementation.An architecture and application form was innovatively proposed to guarantee the data security of the arithmetic network, which could meet the needs of the application layer arithmetic in the scenarios of big data, intelligent technology, etc..The security of the arithmetic network is enhanced by empowering the arithmetic network through the state-secret algorithm.…”
    Get full text
    Article
  6. 46

    NETWORK OPTIMIZATION FOR EFFICIENT DATA TRANSMISSION IN AN IOT NETWORK USING ITERATIVE HYBRID GREY WOLF COOT OPTIMIZATION AND DYNAMIC PHYSICALLY UNCLONABLE FUNCTIONS by Varalakshmi Kalluru, Azad S.M.A.K

    Published 2025-03-01
    “…These methods are compared with a Flow-to-Traffic Graph Neural Network (FTGNet), Harris Hawk Optimization (HHO), and Graph Neural Network (GNN)) algorithms. …”
    Get full text
    Article
  7. 47

    Privacy-preserving ADP for secure tracking control of AVRs against unreliable communication by Kun Zhang, Kezhen Han, Zhijian Hu, Guoqiang Tan

    Published 2025-01-01
    “…To mitigate information leakage and unauthorized access in vehicular network systems, an encrypted guaranteed-cost policy iteration algorithm is developed, incorporating encryption and decryption schemes between the vehicle and the cloud based on the tracking dynamics. …”
    Get full text
    Article
  8. 48

    Heterogeneous bioinformatic data encryption on portable devices by Hao Chen, Xiayun Hong, Yao Cheng, Xiaotong Wang, Liyan Chen, Xuan Cheng, Juncong Lin

    Published 2025-04-01
    “…In this research, we study how to design the heterogeneous version for AES algorithm, a representative encryption algorithm, on such processor to improve throughput and energy efficiency. …”
    Get full text
    Article
  9. 49

    Data transmission system with encryption by chaotic sequences by R. L. Politans’kyy, P. M. Shpatar, A. V. Hres, A. D. Verigha

    Published 2014-06-01
    “…Protection of transferable information in the telecommunication systems is possible by its imposition of coding sequence on a plaintext. Encryption of pseudorandom sequences can be performed by using generation algorithms which are implemented on the basis of the phenomenon of dynamical chaos, which is sensitive to changes in the initial conditions. …”
    Get full text
    Article
  10. 50

    Building Equi-Width Histograms on Homomorphically Encrypted Data by Dragoș Lazea, Anca Hangan, Tudor Cioara

    Published 2025-06-01
    “…To overcome the challenges posed by homomorphic encryption, we redesign the traditional histogram construction algorithm, optimizing it for secure computation by addressing constraints related to nested loops and conditional statements. …”
    Get full text
    Article
  11. 51

    An efficient video slice encryption scheme and its application by Qinyou Huang, Luping Wang, Jie Chen

    Published 2025-06-01
    “…Full encryption algorithms have higher security compared to selective encryption, though they compromise time efficiency. …”
    Get full text
    Article
  12. 52

    Verifiable outsourced attribute-based encryption with access update by Suqing LIN

    Published 2019-02-01
    “…In order to meet the secure and reliable access requirements for the encrypted data stored in the public cloud,a verifiable outsourced attribute-based encryption scheme with access update was proposed.Based on a standard KP-ABE scheme,verifiable outsourced decryption and verifiable access update for a ciphertext through novel constructions for the scheme were obtained.The verifiability of the outsourced computation ensures that the third-party service may perform algorithms honestly.The scheme has selective IND-CPA security for the original and updated ciphertexts,weak master private key security,and verification soundness in the standard model were proved,respectively.Compared with similar schemes from literatures,the proposed scheme can achieve tradeoff in the optimization of functionality,security and efficiency.…”
    Get full text
    Article
  13. 53

    Lightweight privacy preservation blockchain framework for healthcare applications using GM-SSO by Adla Padma, Mangayarkarasi Ramaiah

    Published 2025-03-01
    “…APoW implements the Genetically Modified Salp Swarm Optimization (GM-SSO) algorithm for the node selection. …”
    Get full text
    Article
  14. 54

    Optimization of Lattice-Based Cryptographic Key Generation using Genetic Algorithms for Post-Quantum Security by Tara Nawzad Ahmad Al Attar, Rebaz Nawzad Mohammed

    Published 2025-04-01
    “…The method thus suggested accelerates encryption speed and simultaneously strengthens the security of the optimized key structures. …”
    Get full text
    Article
  15. 55

    A novel dilated weighted recurrent neural network (RNN)-based smart contract for secure sharing of big data in Ethereum blockchain using hybrid encryption schemes by Swetha S, Joe Prathap P M

    Published 2025-06-01
    “…The modified Al-Biruni earth radius search optimization (MBERSO) algorithm is used to make the best keys for this EC-EC encryption scheme. …”
    Get full text
    Article
  16. 56
  17. 57

    DynBlock: dynamic data encryption with Toffoli gate for IoT by Mubasher Haq, Ijaz Ali Shoukat, Alamgir Naushad, Mohsin Raza Jafri, Moid Sandhu, Abd Ullah Khan, Hyundong Shin

    Published 2025-05-01
    “…To address these challenges, this paper proposes a lightweight dynamic block cipher (DynBlock) algorithm. DynBlock is specifically suitable for resource-limited devices, and features a dynamic block size (64-128 bits), which is adaptable to symmetric encryption key sizes. …”
    Get full text
    Article
  18. 58

    Privacy-preserving method for face recognition based on homomorphic encryption. by Zhigang Song, Gong Wang, Wenqin Yang, Yunliang Li, Yinsheng Yu, Zeli Wang, Xianghan Zheng, Yang Yang

    Published 2025-01-01
    “…To overcome this limitation, this paper introduces an optimization scheme based on clustering algorithms to accelerate the facial recognition process within the HE_FaceNet framework. …”
    Get full text
    Article
  19. 59

    Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices by Gabriela Cagua, Valerie Gauthier-Umana, Carlos Lozano-Garzon

    Published 2025-01-01
    “…Selected as the winner of the National Institute of Standards and Technology (NIST) competition for lightweight encryption algorithms, ASCON ensures confidentiality and integrity through authenticated encryption with associated data (AEAD) tailored for resource-constrained environments. …”
    Get full text
    Article
  20. 60

    Medical Image Hybrid Watermark Algorithm Based on Frequency Domain Processing and Inception v3 by Yu Fan, Jingbing Li, Uzair Aslam Bhatti, Saqib Ali Nawaz, Yenwei Chen

    Published 2025-06-01
    “…The algorithm combines the advantages of traditional frequency domain watermarking methods and deep learning techniques. …”
    Get full text
    Article