(redirected from ciphertext)
Also found in: Dictionary, Medical, Legal, Financial, Encyclopedia, Wikipedia.
Graphic Thesaurus  🔍
Display ON
Animation ON
  • noun

Synonyms for encryption

the activity of converting data or information into code

References in periodicals archive ?
DAE: Upon inputting a sender's private key [mathematical expression not reproducible], a message m, and a receiver's identity [ID.sub.r], the sender calculates [mathematical expression not reproducible] to obtain the ciphertext [sigma] .
The squashing technique is very essential as the purpose is to remove the growing noise in the ciphertext without revealing any information about the plaintext or the secret key to the processor.
In case that the size of ci is greater than the maximum packet size, (1) we divide the ciphertext ci into k pieces for some k.
of potential interest: the ciphertext, i.e., the data in encrypted form;
// Decrypting Process obj1 = ARC4.new('01234567') with open("warehouse/cabinet_encrypt.xhtml', 'r') as outFile: chipertext = outFile.read() dec2 = obj1.decrypt(ciphertext) topRoot2 = ETZ.fromstring(dec2)
An authenticated encryption algorithm AE takes a key k and a plaintext m as input and outputs a ciphertext and authentication tag.
Most of the existing work focuses on either embedding access policy in the ciphertext by adapting CP-ABE directly or outsourcing computation to a third party.
Ciphertext policy Attribute Based Encryption scheme used to defend against the collusion which is identity based.
But the power usage data m; cannot be recovered from the ciphertext [mathematical expression not reproducible], since the reader cannot get the ESP's secret key (p, q).
A symmetric encryption scheme SE = (Gen, Enc, Dec) with key space K, plain-text space M, and ciphertext space C consists of three algorithms:
Let (([p.sub.0], ..., [p.sub.31]), ([c.sub.0], ..., [c.sub.31])) [member of] [F.sup.32] x [F.sup.32] be a known pair of plaintext and ciphertext in this paper.
Finally, through the study of the dynamic DNA encoding of images and the operations of a given DNA sequence, the additional use of ciphertext feedback can help to achieve the replacement and diffusion of the pixels, which has further improved the security of the encryption.
Sahai and Waters in 2005 proposed the notation of attribute-based encryption (ABE) [1] in which the ciphertext and key are, respectively, associated with a series of attributes, and an access structure is specified to define the attribute set that can be used to decrypt the ciphertext successfully.
Next, Boyen and Waters [3] proposed an anonymous IBE scheme to guarantee receiver's privacy, where the ciphertext does not leak the identity of the recipient.