Verifiable Chebyshev maps-based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios.
Jing LiLicheng WangLihua WangXianmin WangZhengan HuangJin LiPublished in: Concurr. Comput. Pract. Exp. (2019)
Keyphrases
- image encryption scheme
- chaotic sequence
- encryption scheme
- secret sharing
- chosen plaintext attack
- cloud computing
- secret sharing scheme
- standard model
- service providers
- security analysis
- ciphertext
- image encryption
- s box
- public key
- data sharing
- proxy re encryption
- public key encryption
- cost effective
- image quality
- cca secure
- encryption algorithm
- encrypted data
- low cost
- image processing
- database