Discrete Logarithmic Fuzzy Vault Scheme

05/18/2019
by   Khaled Ahmed Nagaty, et al.
0

In this paper a three fuzzy vault schemes which integrated with discrete logarithmic encryption scheme are proposed. In the first scheme, the message m is encoded with discrete logarithmic encryption scheme using randomly generated identity key ąp̨p̨ą for every message and then divided into non-overlapping segments. In the second scheme, the message is divided into non-overlapping segments and each segment is encoded with discrete logarithmic encryption scheme using the randomly generated identity key ąp̨p̨ą. In the third scheme, the message is divided into non-overlapping segments where even segments are encoded with identity key ąp̨p̨ą_even and odd segments are encoded with identity key ąp̨p̨ą_odd. Identity keys ąp̨p̨ą_even and ąp̨p̨ą_odd are randomly generated for every message. Finally, the encoded segments are declared as coefficients of a polynomial of specific degree. In all proposed schemes, elements of locking set A are used as X-coordinate values to compute evaluations of the polynomial by projecting elements of A onto points lying on the polynomial. A large number of random chaff points that do not lie on the polynomial are added to create noise to hide the encoded segments. Security analysis has shown the proposed scheme enjoys provable security over classical fuzzy vaults.

READ FULL TEXT
research
05/23/2019

A Fuzzy-Fuzzy Vault Scheme

In this paper an enhanced fuzzy vault scheme is proposed which we refer ...
research
08/16/2022

An Adaptive Image Encryption Scheme Guided by Fuzzy Models

A new image encryption scheme using the advanced encryption standard (AE...
research
02/15/2019

A Somewhat Homomorphic Encryption Scheme based on Multivariate Polynomial Evaluation

We propose a symmetric key homomorphic encryption scheme based on the ev...
research
07/16/2023

Format Preserving Encryption in the Bounded Retrieval Model

In the bounded retrieval model, the adversary can leak a certain amount ...
research
10/13/2022

Multi-recipient and threshold encryption based on hidden multipliers

In this paper, a scheme is proposed that allow the dealer to encrypt mes...
research
04/14/2021

Smaller Keys for Code-Based Cryptography: McEliece Cryptosystems with Convolutional Encoders

In this paper we present a novel class of convolutional codes and invest...
research
11/30/2017

Direct Segmented Sonification of Characteristic Features of the Data Domain

Sonification and audification create auditory displays of datasets. Audi...

Please sign up or login with your details

Forgot password? Click here to reset