Moreover, since previous works have not explored the consequences of using the same encryption algorithm for text + image, a lightweight encryption algorithm named Customized Lightweight Encryption Algorithm (CLEA)-256 has been designed, which can be used for encryption and decryption of text files...
Perfect Correctness and (Non-)Negligible Correctness Error.A property common to many compilers is the requirement for the underlying encryption schemes to provide perfect correctness, i.e., there are no valid ciphertexts where the decryption algorithm fails when used with honestly generated keys. Recen...
Decryption or encryption processes depend on controlled alternate quantum walks. The presented cryptosystem method had two stages, such as permutation and substitution, and both were related to independently computed quantum walks. In the study conducted earlier [20], the authors used the BC to build...
2.2. Circulant and Partial Circulant Matrix As mentioned in Section 1, we use a k-partial circulant matrix as the distortion matrix for the code with an efficient decoding algorithm. Here, we give the definition of the circulant matrix and k-partial circulant matrix induced by a random vector...
In this subsection, we enumerate the contributions of our proposed methodology, which are as follows: A detailed literature review of the state-of-the-art schemes of patient and participants detection based on encryption ad security algorithm; Novel cross-domain and access control policies are propos...
This study focuses on enhancing an existing privacy-preserving federated learning algorithm for medical data through the utilization of homomorphic encryption, building upon prior research. In contrast to the previous paper, this work is based upon Wibawa, using a single key for HE, our proposed ...
In this subsection, we enumerate the contributions of our proposed methodology, which are as follows: A detailed literature review of the state-of-the-art schemes of patient and participants detection based on encryption ad security algorithm; Novel cross-domain and access control policies are propos...