Chaos-based joint speech encryption scheme using SHA-1

Author(s):  
Gurvir Kaur ◽  
Kuldeepak Singh ◽  
Harsimranjit Singh Gill
2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Qiuyu Zhang ◽  
Zhenyu Zhao ◽  
Minrui Fu

In order to ensure the confidentiality and secure sharing of speech data, and to solve the problems of slow deployment of attribute encryption systems and fine-grained access control in cloud storage, a speech encryption scheme based on ciphertext policy hierarchical attributes was proposed. First, perform hierarchical processing of the attributes of the speech data to reflect the hierarchical structure and integrate the hierarchical access structure into a single-access structure. Second, use the attribute fast encryption framework to construct the attribute encryption scheme of the speech data, and use the integrated access to the speech data; thus, the structure is encrypted and uploaded to the cloud for storage and sharing. Finally, use the hardness of decisional bilinear Diffie–Hellman (DBDH) assumption to prove that the proposed scheme is secure in the random oracle model. The theoretical security analysis and experimental results show that the proposed scheme can achieve efficient and fine-grained access control and is secure and extensible.


Informatica ◽  
2015 ◽  
Vol 26 (3) ◽  
pp. 543-556
Author(s):  
Shengbao Wang ◽  
Peng Zeng ◽  
Kim-Kwang Raymond Choo ◽  
Hongbing Wang

Informatica ◽  
2012 ◽  
Vol 23 (4) ◽  
pp. 537-562 ◽  
Author(s):  
Ting-Yi Chang ◽  
Min-Shiang Hwang ◽  
Wei-Pang Yang

2016 ◽  
Vol E99.B (9) ◽  
pp. 2108-2111
Author(s):  
Minkyu KIM ◽  
Je HONG PARK ◽  
Dongyoung ROH

Author(s):  
Yunfeng Wang ◽  
Xing Zheng ◽  
Jing wang ◽  
Donghui Guo

2018 ◽  
Vol 5 (2) ◽  
pp. 1 ◽  
Author(s):  
SHAFI'I MUHAMMAD ABDULHAMID ◽  
NAFISAT ABUBAKAR SADIQ ◽  
ABDULLAHI MOHAMMED ◽  
NADIM RANA ◽  
HARUNA CHIROMA ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document