A NEW PUBLIC-KEY ENCRYPTION SCHEME BASED ON NEURAL NETWORKS AND ITS SECURITY ANALYSIS

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 49232-49239 ◽  
Author(s):  
Tsu-Yang Wu ◽  
Chien-Ming Chen ◽  
King-Hang Wang ◽  
Jimmy Ming-Tai Wu

2020 ◽  
Vol 14 (1) ◽  
pp. 218-223
Author(s):  
Jean-Sébastien Coron ◽  
Agnese Gini

AbstractAt Crypto 2018, Aggarwal, Joux, Prakash and Santha (AJPS) described a new public-key encryption scheme based on Mersenne numbers. Shortly after the publication of the cryptosystem, Beunardeau et al. described an attack with complexity 𝓞(22h). In this paper, we describe an improved attack with complexity 𝓞(21.75h).


2007 ◽  
Vol 22 (1) ◽  
pp. 95-102 ◽  
Author(s):  
Hai-Bo Tian ◽  
Xi Sun ◽  
Yu-Min Wang

2011 ◽  
Vol 5 (7) ◽  
pp. 809-822 ◽  
Author(s):  
Ping Pan ◽  
Lihua Wang ◽  
Licheng Wang ◽  
Lixiang Li ◽  
Yixian Yang

2021 ◽  
Vol 2 (3) ◽  
pp. 326-334
Author(s):  
Khairunas ◽  
Muhammad Zarlis ◽  
Sawaluddin

A public key encryption cryptography system can be utilized to generate ciphertext of a message using a public key. However, this public key encryption cryptography system cannot be utilized if you want to generate ciphertext using several different keys. Solving the problems above can use the Chosen Ciphertext Secure Public Key Threshold Encryption scheme but are the securities from Threshold Encryption really strong in securing messages, therefore the above problems can be analyzed for Data Security Against Chosen Ciphertext Secure Public Key Attacks Using Threshold Encryption Schemes. The work process starts from Setup which functions to generate the server's private key and public key. Then, the process is continued with ShareKeyGen which functions to generate private keys based on the user's identity. After that, the process continues with ShareVerify which serves to verify the key generated from the ShareKeyGen process. The process will be continued again with Combine which serves to generate a private key that will be used in the decryption process. After that, the process will continue with the encryption process of the secret message. The ciphertext obtained will be sent to the recipient. The receiver verifies the ciphertext by running ValidateCT. Finally, the ciphertext is decrypted by running Decrypt. The software created can be used to display the workflow process of the Threshold schema. In addition, it makes it easier to test intercepts of ciphertext messages to other users so that generic securities analysis is carried out in testing the resulting ciphertext. The results of the implementation of  Threshold Encryption algorithm scheme can protect important personal data, because it involves human rights, namely the right to access, the right to delete, the right to correct, the right to be corrected and the right to transfer personal data safely from attacks.


2005 ◽  
Vol 22 (5) ◽  
pp. 490-497
Author(s):  
Zhengtao Jiang ◽  
Yanhua Hao ◽  
Yumin Wang

Sign in / Sign up

Export Citation Format

Share Document