CryptographyPub Date : 2018-08-14DOI: 10.1201/9781315282497-4
Douglas R Stinson, Maura B. Paterson
{"title":"Block Ciphers and Stream Ciphers","authors":"Douglas R Stinson, Maura B. Paterson","doi":"10.1201/9781315282497-4","DOIUrl":"https://doi.org/10.1201/9781315282497-4","url":null,"abstract":"","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2018-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44978802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CryptographyPub Date : 2016-07-01DOI: 10.4018/978-1-7998-1763-5.ch023
IssacBiju, RuraLauretha, H. Kumar
{"title":"Implementation and Evaluation of Steganography Based Online Voting System","authors":"IssacBiju, RuraLauretha, H. Kumar","doi":"10.4018/978-1-7998-1763-5.ch023","DOIUrl":"https://doi.org/10.4018/978-1-7998-1763-5.ch023","url":null,"abstract":"Though there are online voting systems available, the authors propose a new and secure steganography based E2E (end-to-end) verifiable online voting system, to tackle the problems in voting process. This research implements a novel approach to online voting by combining visual cryptography with image steganography to enhance system security without degrading system usability and performance. The voting system will also include password hashed-based scheme and threshold decryption scheme. The software is developed on web-based Java EE with the integration of MySQL database server and Glassfish as its application server. The authors assume that the election server used and the election authorities are trustworthy. A questionnaire survey of 30 representative participants was done to collect data to measure the user acceptance of the software developed through usability testing and user acceptance testing.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70442788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CryptographyPub Date : 2016-04-01DOI: 10.4018/IJTHI.2016040106
Wei Zhang
{"title":"A Pairing-based Homomorphic Encryption Scheme for Multi-User Settings","authors":"Wei Zhang","doi":"10.4018/IJTHI.2016040106","DOIUrl":"https://doi.org/10.4018/IJTHI.2016040106","url":null,"abstract":"A new method is presented to privately outsource computation of different users. As a significant cryptographic primitive in cloud computing, homomorphic encryption HE can evaluate on ciphertext directly without decryption, thus avoid information leakage. However, most of the available HE schemes are single-user, which means that they could only evaluate on ciphertexts encrypted by the same public key. Adopting the idea of proxy re-encryption, and focusing on the compatibility of computation, the authors provide a pairing-based multi-user homomorphic encryption scheme. The scheme is a somewhat homomorphic one, which can do infinite additions and one multiplication operation. Security of the scheme is based on subgroup decision problem. The authors give a concrete security model and detailed security analysis.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2016-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4018/IJTHI.2016040106","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70471345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CryptographyPub Date : 2005-11-01DOI: 10.1201/9781420057133-12
Douglas R Stinson
{"title":"Identification Schemes and Entity Authentication","authors":"Douglas R Stinson","doi":"10.1201/9781420057133-12","DOIUrl":"https://doi.org/10.1201/9781420057133-12","url":null,"abstract":"","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2005-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"65964099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CryptographyPub Date : 2005-11-01DOI: 10.1201/9781420057133-8
Douglas R Stinson
{"title":"The RSA Cryptosystem and Factoring Integers","authors":"Douglas R Stinson","doi":"10.1201/9781420057133-8","DOIUrl":"https://doi.org/10.1201/9781420057133-8","url":null,"abstract":"","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2005-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"65964122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CryptographyPub Date : 2005-11-01DOI: 10.1201/9781420057133-9
Douglas R Stinson
{"title":"Public-Key Cryptography and Discrete Logarithms","authors":"Douglas R Stinson","doi":"10.1201/9781420057133-9","DOIUrl":"https://doi.org/10.1201/9781420057133-9","url":null,"abstract":"","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2005-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"65964168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}