Identity-Based Hybrid Format-Preserving Encryption Scheme
S Li, Y Gao, T Shi�- 2020 IEEE 5th Information Technology and�…, 2020 - ieeexplore.ieee.org
… schemes is based on a symmetric encryption system, which has problems … identity-based
format-preserving encryption scheme. Compared with the existing format-preserving encryption …
format-preserving encryption scheme. Compared with the existing format-preserving encryption …
Identity-based format preserving encryption of data desensitization program
X Zhang, Y Zhang, G Luo…�- …�Conference on Computer�…, 2020 - ieeexplore.ieee.org
… format preserving encryption desensitization scheme, this paper proposes a general model
for the application of identity based format pre encryption … format retention encryption scheme …
for the application of identity based format pre encryption … format retention encryption scheme …
Identity-based format-preserving encryption
… format-preserving encryption (FPE) have been standardized [19] and are in widespread
use for the encryption … damage from key exposure, we introduce identity-based FPE (IB-FPE). …
use for the encryption … damage from key exposure, we introduce identity-based FPE (IB-FPE). …
A format preserving encryption scheme for sensitive information
Y ZHANG, G LUO, Y ZHANG, X ZHANG…�- Computer�…, 2020 - joces.nudt.edu.cn
… Format preserving encryption has the characteristics of unchanged data format and data length
after encryption… It is proved that the scheme satisfies the security of identity-based pseudo…
after encryption… It is proved that the scheme satisfies the security of identity-based pseudo…
[HTML][HTML] Security establishment in ADS-B by format-preserving encryption and blockchain schemes
… encryption in two stages: key encryption and data encryption. Key encryption utilizes
identity-based encryption, … NIST standard format-preserving encryption techniques FF1 and FF3-1. …
identity-based encryption, … NIST standard format-preserving encryption techniques FF1 and FF3-1. …
[PDF][PDF] Evolution of Format Preserving Encryption on IoT Devices: FF1+
A Baccarini, T Hayajneh - 2019 - scholarspace.manoa.hawaii.edu
… Additionally, we introduce the concept of Identity-based FPE, as proposed in [31, 32]. The
scheme is used to reduce the risk of attacks due to key exposure. This is accomplished by …
scheme is used to reduce the risk of attacks due to key exposure. This is accomplished by …
Targeted Ciphers for Format-Preserving Encryption
S Miracle, S Yilek�- …�Conference on selected Areas in cryptography, 2018 - Springer
… Ciphers that can directly support this domain targeting are useful in Format-Preserving
Encryption, where one wishes to encipher points on a potentially complex domain \(\mathcal{S}\). …
Encryption, where one wishes to encipher points on a potentially complex domain \(\mathcal{S}\). …
FPRC5: Improving the Data Security using Format PreservedRC5 Block Cipher Algorithm in Credit Card Application
D Prakash�- 2021 6th International Conference on�…, 2021 - ieeexplore.ieee.org
… [20] by combining AES, exclusive OR, &conversion method, this document proposed a
Format Preserving Encryption technique for 16-digit numeric data. By conserving the format and …
Format Preserving Encryption technique for 16-digit numeric data. By conserving the format and …
Property preserving symmetric encryption revisited
S Chatterjee, MPL Das�- Advances in Cryptology–ASIACRYPT 2015: 21st�…, 2015 - Springer
… Next, we show that given a find-then-guess secure orthogonality preserving encryption of
vectors of length 2n, there exists left-or-right secure orthogonality preserving encryption of …
vectors of length 2n, there exists left-or-right secure orthogonality preserving encryption of …
The performance cost of preserving data/query privacy using searchable symmetric encryption
S Mc Brearty, W Farrelly…�- Security and�…, 2016 - Wiley Online Library
… are being deployed to enable data to be encrypted online. Despite being a relatively obscure
form of Cryptography, Searchable Encryption is now at the point that it can be deployed …
form of Cryptography, Searchable Encryption is now at the point that it can be deployed …