Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove the security of the scheme under indistinguishability under chosen-plaintext attack (IND-CPA) through a game-based security proof. The security proof gives a mathematical analysis and its complexity of hardness. Also, it presents security analysis against all the known attacks with respect to the message expansion and homomorphic operations.
The ultimate goal of any sale contract is to maximize the combined returns of the parties, knowing that these returns are not realized (in long-term contracts) except in the final stages of the contract. Therefore, this requires the parties to the contract to leave some elements open, including the price, because the adoption of a fixed price and inflexible will not be appropriate to meet their desires when contracting, especially with ignorance of matters beyond their will and may affect the market conditions, and the possibility of modifying the fixed price through The elimination is very limited, especially when the parties to the contract are equally in terms of economic strength. Hence, in order to respond to market uncertainties, the
... Show MoreData <span>transmission in orthogonal frequency division multiplexing (OFDM) system needs source and channel coding, the transmitted data suffers from the bad effect of large peak to average power ratio (PAPR). Source code and channel codes can be joined using different joined codes. Variable length error correcting code (VLEC) is one of these joined codes. VLEC is used in mat lab simulation for image transmission in OFDM system, different VLEC code length is used and compared to find that the PAPR decreased with increasing the code length. Several techniques are used and compared for PAPR reduction. The PAPR of OFDM signal is measured for image coding with VLEC and compared with image coded by Huffman source coding and Bose-
... Show MoreFrom a medical perspective, autoimmunity reflects the abnormal behaviour of a human being. This state is shaped when the defense of an organism betrays its own tissues. Allegedly, the immune system should protect the body against attacking cells. When an autoimmune disease attacks, it results in perilous actions like self-destruction. However, from a psychological perspective, the French philosopher Jacques Derrida (1930-2004) explains that autoimmunity harms both the self and the other. As a result, the organ disarms the betraying cells, as the immune system cannot provide necessary protection. From a literary perspective, Derrida has termed autoimmunity as deconstruction for almost forty years. Autoimmunity starts with the stage of a norm
... Show MoreThe effect of approaching nozzle jet from the deposition surface
on structural, optical and morphology properties of copper oxide thin
films was studied. The film was prepared by homemade fully
computerized CNC spray pyrolysis deposition technique at
preparations speed (3, 4, 5, and 6 mm/sec). The repeated line mode
was used at deposition temperature equal 450 °C whereas the
spraying time was in the range of (15-30 min) according to the
deposition speed. The film exhibit polycrystalline structure with
preferred orientation along (-111), (022) and (011), (002) at a 2θ
value of (35.63o) and (38.8o) respectively. Optical band gaps were
recorded at these speed shows variance in value from (1.53-2.08 eV).
Fi
Quantum channels enable the achievement of communication tasks inaccessible to their
classical counterparts. The most famous example is the distribution of secret keys. Unfortunately, the rate
of generation of the secret key by direct transmission is fundamentally limited by the distance. This limit
can be overcome by the implementation of a quantum repeater. In order to boost the performance of the
repeater, a quantum repeater based on cut-off with two different types of quantum memories is suggestd,
which reduces the effect of decoherence during the storage of a quantum state.
The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show MoreThe paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show MoreVarious semantic innovations and expansions have been tackled as factors and sources of neos. A variety of internal (linguistic) and external (extra-linguistic) motives and motifs leads to the appearance of new terms causing such changes in the political language. Some statesmen are productive in introducing new terms and creative in manipulating expressions and meanings.
New words are nonces that get metaphorical expansion for quadrilateral motivations resting on extra meaning innovation, new terms at the semantic expansions to be honed as neos. In tracing the phases of the semantic processes of neos and hulks, lexical and semantic changes might be of widening or narrowing of refe
... Show More