Learn More
While the traditional public-key encryption schemes with keyword search (PEKS) were pointed out suffering the performance problems, some high-performance PEKS recently have drawn more attentions. Unfortunately, these performance-enhanced schemes could encounter the same security attacks as the traditional PEKS met before. In this paper, Liu et al.'s(More)
Mounting popularity of the Internet has led to the birth of instant messaging, an up-and-coming form of Internet communication. Instant messaging is very popular with businesses and individuals since it has instant communication ability. As a result, Internet security has become a pressing and important topic for discussion. Therefore, in recent years, a(More)
Cryptography is increasingly used in E-commerce, especially in untraceable payment system and electronic voting system. Protocols for these systems require anonymous digital signing, and blind signature is the answer to it. Chaum stated that every blind signature protocol should hold two fundamental properties, blindness and intractableness. All blind(More)
Watermarking protocols are designed for tracing illegal distributors when unauthorized copies are found. So far, most of the proposed schemes set up two or more watermarks embedded to a copy by the seller before it was sold. The main potential concerns of multiple watermarking are the image quality would be damaged and any earlier embedded watermarks would(More)
Internet has become an Integral part and prime need of every human being in their day to day life. People now prefer to do transaction over the internet than doing it offline as it reduces time consumption. In such scenarios, securing customer data is one of the biggest challenges for software developers. For this reason Security protocols like Blind(More)
Buyer-seller watermarking protocols, combining digital watermarking and cryptographic tools, have become a feasible technique to guarantee piracy tracing. For securing health information management, watermarking protocols may be introduced to solve the problem of traitor tracing, i.e., tracing the physician who illegally discloses the patient’s health(More)
Although digital watermarking protocols have been studied extensively for achieving copyright protection over the Internet for many years, the new issue of secondhand watermarking protocols has been largely ignored. Cheung and Curreem first proposed a buyer-reseller wa-termarking protocol for digital content redistribution in the secondhand markets. Later,(More)
  • 1