Mapping private keys into one public key using binary matrices and masonic cipher: Caesar cipher as a case study.
Ahmad M. ManasrahBasim Najim Al-DinPublished in: Secur. Commun. Networks (2016)
Keyphrases
- ciphertext
- public key
- secret key
- private key
- binary matrices
- encryption scheme
- standard model
- proxy re encryption
- image encryption
- security analysis
- identity based encryption
- image authentication
- encryption algorithm
- digital signature
- public key cryptography
- session key
- diffie hellman
- security model
- privacy preserving
- provably secure
- homomorphic encryption
- authentication scheme
- signature scheme
- s box