News Release on Encryption Research: August-2018

New Algorithm Solves A Major Problem With Cloud Encryption

Homomorphic secret writing is one in every of the foremost exciting new analysis topics in cryptography, that guarantees to create cloud computing absolutely secure. With it, an internet user would send encrypted information to a server within the cloud, which might method it while not decrypting it and remand a still-encrypted result.

Sometimes, however, the server has to grasp one thing concerning the info it’s handling. Otherwise, some machine tasks become prohibitively time intense — if not outright not possible. [1]

Parallel Crossed Chaotic Encryption for Hyperspectral Images.

Featured Application: <bold>This work presents a time-efficient and parallel cryptography rule that’s appropriate for encrypting a big quantity of knowledge, which might be accustomed encipher Hyperspectral pictures and Hyperspectral video in a time period for remote sensing, classification, beholding, earth watching, security, and medical applications.</bold> Hyperspectral pictures (HI) collect info from across the spectrum, and that they square measure a vital tool for characteristic materials, recognizing processes and finding objects. [2]

Fully Homomorphic Encryption for Parallel Implementation of Approximate Methods for Solving Differential Equations

A parallel totally homomorphic encoding for rational numbers is developed during this paper. a similarity of a process is achieved by mistreatment ways of standard arithmetic. encoding is built by mapping the sphere of rational numbers onto a vector house. 2 operations, specifically addition and multiplication, square measure outlined. Addition and multiplication tables square measure made, that ensures that a vector house is closed below these mathematical operations. [3]

Improved Functional Encryption Schemes by Using Novel Techniques

Nowadays a lot of and a lot of folks or enterprises choose to source their knowledge to the remote cloud servers. but the way to expeditiously and flexibly share the outsourced knowledge storage secure could be a terrible challenge drawback, the scientific discipline primitive of useful coding is such a method to resolve this drawback. [4]

Symmetric Key Encryption with Conjunctive Field Free Keyword Search Scheme

Searchable interchangeable cryptography (SSE) permits a sender to source the encrypted files to a cloud server, whereas maintaining the flexibility to not absolutely search over it while not knowing the sensitive knowledge contents. previous add this space has targeted on a single keyword search. Conjunctive Keyword Searches (CKS) schemes improve system usability by retrieving the matched files, however during this kind of search the receiver has got to give the server with a trapdoor for each individual keyword within the conjunction associate degreed consider an intersection protocol to retrieve the proper set of files, in alternative words the receiver has got to repeatedly perform the search protocol for several times supported the quantity of keywords within the conjunction. Most of the present (CKS) schemes use conjunctive keyword searches with mounted position keyword fields, this sort of search isn’t applicable for several real applications, equivalent to the information text and also the body of an e-mail. [5]

Reference

[1] New Algorithm Solves A Major Problem With Cloud Encryption

(web link)

[2] Parallel Crossed Chaotic Encryption for Hyperspectral Images.

Villaseñor C, Gutierrez-Frias EF, Arana-Daniel N, Alanis AY, Lopez-Franco C. Parallel Crossed Chaotic Encryption for Hyperspectral Images. Applied Sciences (2076-3417). 2018 Jul 1;8(7). (Web link)

[3] Fully Homomorphic Encryption for Parallel Implementation of Approximate Methods for Solving Differential Equations

Vishnevsky AK, Krendelev SF. Fully Homomorphic Encryption for Parallel Implementation of Approximate Methods for Solving Differential Equations. InInternational Conference on Parallel Computational Technologies 2018 Apr 4 (pp. 119-134). Springer, Cham. (web link)

[4] Improved Functional Encryption Schemes by Using Novel Techniques

Wang XA, Zhang J, Wu G, Yu C. Improved Functional Encryption Schemes by Using Novel Techniques. InInternational Conference on Intelligent Networking and Collaborative Systems 2018 Sep 5 (pp. 437-444). Springer, Cham. (web link)

[5] Symmetric Key Encryption with Conjunctive Field Free Keyword Search Scheme

Sher Ali Fairouz1,2* and Song Feng Lu1
1Huazhong University of Science and Technology, Wuhan, Hubei 430074, P.R.China.
2Kufa University, Kufa, Iraq. (web link)

Leave a Reply

Your email address will not be published. Required fields are marked *