Vimarsana.com

Latest Breaking News On - Ncryption - Page 1 : vimarsana.com

WhatsApp threatens to exit India if forced to break message encryption

WhatsApp has threatened to exit if it is forced to break its end-to-end encryption. This statement was made by Advocate Tejas Karia before the Delhi High Court during a hearing challenging Rule 4(2) of the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021.

Brazil
Delhi
India
United-states
America
Justice-manmohan
Kirtiman-singh
Information-technology
Information-technology-intermediary-guidelines
Delhi-high-court
Facebook
Tejas-karia

Heavener's Runestone Park hopes eclipse & ancient stories boost tourism

An Oklahoma park known for its large sandstone with what many believe is a boundary marker placed by Vikings, is hoping the recent solar eclipse draws in tourism. We brought you LIVE coverage from Heavener’s Runestone Park Monday of the total solar eclipse.

Poteau-mountain
Oklahoma
United-states
Indian-rock
Alaska
Anchorage
American
Heavener-runestone
Lynn-webster
Pete-eberhardt
Marcy-shiel

"Attribute-hiding fuzzy encryption for privacy-preserving data evaluati" by Zhenhua Chen, Luqi Huang et al.

Privacy-preserving data evaluation is one of the prominent research topics in the big data era. In many data evaluation applications that involve sensitive information, such as the medical records of patients in a medical system, protecting data privacy during the data evaluation process has become an essential requirement. Aiming at solving this problem, numerous fuzzy encryption systems for different similarity metrics have been proposed in literature. Unfortunately, the existing fuzzy encryption systems either fail to achieve attribute-hiding or achieve it, but are impractical. In this paper, we propose a new fuzzy encryption scheme for privacy-preserving data evaluation based on overlap distance, which can work in an integer domain while achieving attribute-hiding. In particular, we develop a novel approach to enable an accurate overlap distance to be fast calculated. This technique makes the number of pairing operations during decryption stage negative correlation with the size of the threshold, which is pretty practical for some applications especially with a large threshold. Additionally, we provide a formal security analysis of the proposed scheme, followed by a comprehensive experimental. Also we show that our scheme can be well applied to some scenarios, such as fuzzy keyword searchable encryption and attribute-hiding closest substring encryption.

Attribute-hiding
Data-evaluation
Ncryption
Uzzy-encryption
Amming-distances
Nspection
Edical-diagnostic-imaging
Verlap-distance
Redicate-encryption
Rivacy
Ecurity

"Secure Data Integrity Check Based on Verified Public Key Encryption wi" by Wenchao Li, Wily Susilo et al.

Cloud computing eliminates the need for local hardware, addressing the challenge of high computing expenses. However, entrusting data to the cloud may pose the risk of unintentional data loss. Using multiple copies and multi-cloud servers is promising because even if the data on one cloud storage server is compromised, the data proprietor can retrieve the information from alternate cloud storage servers. To protect data security, data needs to be encrypted before uploading to the cloud. However, users cannot directly confirm whether their encrypted documents and copies are stored securely and with integrity on cloud servers. To verify data copies on remote servers without downloading and decrypting, we propose Public Verification Public Key Encryption with Equality Test (PVPKEET). Under PVPKEET, users upload encrypted data to cloud servers, and then the test result and proof will be provided by the cloud server without decryption. The publicly verified proof can be examined by all users, allowing everyone to witness the copies stored correctly. Our approach is resistant to chosen-plaintext attacks and is verifiable. A comparison with prior research demonstrates the efficiency and feasibility of our design.

Public-verification-key-encryption
Equality-test
Cloud-computing
Ata-integrity
Ncryption
Quality-test
Eyword-search
Ulti-cloud-server
Rivacy-preserve
Ublic-key
Ublic-verification

vimarsana © 2020. All Rights Reserved.