Page 88 - Encryption Algorithm News Today : Breaking News, Live Updates & Top Stories | Vimarsana

Stay updated with breaking news from Encryption algorithm. Get real-time updates on events, politics, business, and more. Visit us for reliable news and exclusive interviews.

Top News In Encryption Algorithm Today - Breaking & Trending Today

"Attribute-Based Encryption with Reliable Outsourced Decryption in Clou" by Chunpeng Ge, Zhe Liu et al.

Outsourcing the heavy decryption computation to a cloud service provider has been a promising solution for a resource-constrained mobile device to deploy an attribute-based encryption scheme. However, the current attribute based encryption with outsourced decryption schemes only enable the mobile device to verify whether the cloud service provider has returned a correct decryption result, they lack a mechanism to enable the cloud service provider to escape from a mobile device's wrong claim if it has returned a correct decryption result. This paper, for the first time, proposes an attribute based encryption with reliable outsourced decryption scheme using the blockchain smart contract. In the proposed scheme, not only can the mobile device verify whether the cloud service provider has returned a correct decryption result, but also the cloud service provider can escape from a wrong claim if the returned decryption result is correct. Moreover, our system achieves the fairness proper ....

Attribute Based Encryption , Cloud Computing , Mobile Handsets , Eliable Outsourced Decryption , Smart Contract , Smart Contracts ,

"PCSF: Privacy-Preserving Content-based Spam Filter" by Intae Kim, Willy Susilo et al.

The purpose of privacy-preserving spam filtering is to inspect email while preserving the privacy of its detection rules and the email content. Although many solutions have emerged, they suffer from the following: 1) The privacy provided is insufficient as the email content or detection rules may be exposed to third parties; 2) Due to improper use of encryption, exhaustive word search attacks are possible, potentially breaking the confidentiality of encrypted emails; 3) When spam filtering is outsourced, email is given to the outsource, where user privacy may be compromised if privacy protection measures are not properly put in place; 4) Confirmation of whether the encrypted email is spam is only determined after the receiver receives the email, which can lead to a situation in which spam is loaded to the memory of the receiver’s terminal for spam filtering. This can be harmful, for example, when an attacker inserts a web browser vulnerability into the body of an email to lure users ....

Privacy Preserving Content Based Spam Filter , Naive Bayes , Information Filters , Re Validation , Privacy Preserving , Ule Hiding , Spam Filter , Nsolicitede Mail ,

"Secure Replication-Based Outsourced Computation Using Smart Contracts" by Willy Susilo, Fuchun Guo et al.

The replication-Based Outsourced Computation (RBOC) mechanism allows a client to outsource the same computing job to multiple contractors and the honest contractors will get paid in the incentivized system based on the fact that a majority of contractors will honestly perform the computation. As self-executing contracts, smart contracts are utilized in the decentralized blockchain networks to execute coded programs automatically transparently, and publicly. It is natural to apply smart contracts to RBOC to improve performance by setting smart contracts as the converter between the client and contractors to reduce the load on the client. However, it is infeasible to directly combine these two blocks together because the data including returned computing results from contractors in the decentralized blockchain are in the form of plaintexts such that some lazy contractors could copy others' results as their own and still get paid, which will compromise the security of RBOC. The exist ....

Based Outsourced Computation , Azy Contractors , Utsourced Computation , Performance Evaluation , Public Key , Ublic Key Encryption With Equality Test , Smart Contracts ,

"Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism f" by Chunpeng Ge, Willy Susilo et al.

Cloud computing, which provides adequate storage and computation capability, has been a prevalent information infrastructure. Secure data sharing is a basic demand when data was outsourced to a cloud server. Attribute-based proxy re-encryption has been a promising approach that allows secure encrypted data sharing on clouds. With attribute-based proxy re-encryption, a delegator can designate a set of shared users through issuing a re-encryption key which will be used by the cloud server to transform the delegator's encrypted data to the shared users'. However, the existing attribute-based proxy re-encryption schemes lack a mechanism of revoking users from the sharing set which is critical for data sharing systems. Therefore, in this paper, we propose a concrete attribute-based proxy re-encryption with direct revocation mechanism (ABPRE-DR) for encrypted data sharing that enables the cloud server to directly revoke users from the original sharing set involved in the re-encrypt ....

Attribute Based Encryption , Cloud Computing , Data Sharing , Maintenance Engineering , Systems Architecture ,