Randomized block size (RBS) model for secure data storage in distributed server

K Sinha, P Paul, A Amritanjali - KSII Transactions on Internet and …, 2021 - koreascience.kr
Today distributed data storage service are being widely used. However lack of proper
means of security makes the user data vulnerable. In this work, we propose a Randomized …

Shrinkable Cryptographic Technique Using Involutory Function for Image Encryption

M Karmakar, A Priya, K Sinha, M Verma - International Conference on …, 2022 - Springer
Cryptography is the technique of hiding and transmitting confidential information via the
internet. There are various traditional cryptographic approaches have been presented by …

Post-quantum security of plain OAEP transform

E Ebrahimi - IACR International Conference on Public-Key …, 2022 - Springer
In this paper, we show that OAEP transform is indistinguishable under chosen ciphertext
attack in the quantum random oracle model if the underlying trapdoor permutation is …

Instantiability of classical random-oracle-model encryption transforms

A Murphy, A O'Neill, M Zaheri - … Conference on the Theory and Application …, 2022 - Springer
Extending work leveraging program obfuscation to instantiate random-oracle-based
transforms (eg, Hohenberger et al., EUROCRYPT 2014, Kalai el al., CRYPTO 2017), we …

How to dynamically incentivize sufficient level of IoT security

J Su, M Bartholic, A Stange, R Ushida… - … Cryptography and Data …, 2020 - Springer
This paper propose an incentive mechanism to secure large numbers of devices through the
use of insurance based on smart contracts. It consists of the automated security evaluation of …

Post-quantum Security of OAEP Transform

E Ebrahimi - Cryptology ePrint Archive, 2021 - eprint.iacr.org
In this paper, we show that OAEP transform is indistinguishable under chosen ciphertext
attack in the quantum random oracle model if the underlying trapdoor permutation is …

Stronger Security for Practical Encryption Schemes

MZ Darkahi - 2020 - search.proquest.com
Despite recent advances in cryptography, security analyses of encryption schemes fall short
of ruling out some possible attacks. Here we study two such types of attacks: selective …