Identity-Based Hybrid Format-Preserving Encryption Scheme

S Li, Y Gao, T Shi�- 2020 IEEE 5th Information Technology and�…, 2020 - ieeexplore.ieee.org
… schemes is based on a symmetric encryption system, which has problems … identity-based
format-preserving encryption scheme. Compared with the existing format-preserving encryption

Identity-based format preserving encryption of data desensitization program

X Zhang, Y Zhang, G Luo…�- …�Conference on Computer�…, 2020 - ieeexplore.ieee.org
format preserving encryption desensitization scheme, this paper proposes a general model
for the application of identity based format pre encryption … format retention encryption scheme …

Identity-based format-preserving encryption

M Bellare, VT Hoang�- Proceedings of the 2017 ACM SIGSAC�…, 2017 - dl.acm.org
format-preserving encryption (FPE) have been standardized [19] and are in widespread
use for the encryption … damage from key exposure, we introduce identity-based FPE (IB-FPE). …

A format preserving encryption scheme for sensitive information

Y ZHANG, G LUO, Y ZHANG, X ZHANG…�- Computer�…, 2020 - joces.nudt.edu.cn
Format preserving encryption has the characteristics of unchanged data format and data length
after encryption… It is proved that the scheme satisfies the security of identity-based pseudo…

[HTML][HTML] Security establishment in ADS-B by format-preserving encryption and blockchain schemes

J Habibi Markani, A Amrhar, JM Gagn�, RJ Landry�- Applied Sciences, 2023 - mdpi.com
encryption in two stages: key encryption and data encryption. Key encryption utilizes
identity-based encryption, … NIST standard format-preserving encryption techniques FF1 and FF3-1. …

[PDF][PDF] Evolution of Format Preserving Encryption on IoT Devices: FF1+

A Baccarini, T Hayajneh - 2019 - scholarspace.manoa.hawaii.edu
… Additionally, we introduce the concept of Identity-based FPE, as proposed in [31, 32]. The
scheme is used to reduce the risk of attacks due to key exposure. This is accomplished by …

Targeted Ciphers for Format-Preserving Encryption

S Miracle, S Yilek�- …�Conference on selected Areas in cryptography, 2018 - Springer
… Ciphers that can directly support this domain targeting are useful in Format-Preserving
Encryption, where one wishes to encipher points on a potentially complex domain \(\mathcal{S}\). …

FPRC5: Improving the Data Security using Format PreservedRC5 Block Cipher Algorithm in Credit Card Application

D Prakash�- 2021 6th International Conference on�…, 2021 - ieeexplore.ieee.org
… [20] by combining AES, exclusive OR, &conversion method, this document proposed a
Format Preserving Encryption technique for 16-digit numeric data. By conserving the format and …

Property preserving symmetric encryption revisited

S Chatterjee, MPL Das�- Advances in Cryptology–ASIACRYPT 2015: 21st�…, 2015 - Springer
… Next, we show that given a find-then-guess secure orthogonality preserving encryption of
vectors of length 2n, there exists left-or-right secure orthogonality preserving encryption of …

The performance cost of preserving data/query privacy using searchable symmetric encryption

S Mc Brearty, W Farrelly…�- Security and�…, 2016 - Wiley Online Library
… are being deployed to enable data to be encrypted online. Despite being a relatively obscure
form of Cryptography, Searchable Encryption is now at the point that it can be deployed …