Zobrazeno 1 - 10
of 1 012
pro vyhledávání: '"secret sharing scheme"'
Autor:
Ratseev, Sergey Mihailovich
Publikováno v:
Известия Саратовского университета. Новая серия. Серия Математика. Механика. Информатика, Vol 24, Iss 3, Pp 330-341 (2024)
There are perfect and ideal threshold secret sharing schemes, for example, Shamir’s secret sharing scheme. For the case of general secret sharing schemes with an arbitrary access structure, it is possible to construct a perfect scheme for any acce
Externí odkaz:
https://doaj.org/article/633e59bae65e4bf09915a3cd3e154517
Publikováno v:
Computer and Knowledge Engineering, Vol 6, Iss 2, Pp 15-24 (2023)
Secret sharing schemes are ideally suited to save highly sensitive information in distributed systems. On the other hand, Zigzag-Decodable (ZD) codes are employed in wireless distributed platforms for encoding data using only bit-wise shift and XOR o
Externí odkaz:
https://doaj.org/article/b4f7c43e1f34472aacdcc69777856901
Publikováno v:
网络与信息安全学报, Vol 9, Pp 106-115 (2023)
Due to the existing cloud data deduplication schemes mainly focus on file-level deduplication.A scheme was proposed, based on attribute encryption, to support data block-level weight removal.Double granularity weight removal was performed for both fi
Externí odkaz:
https://doaj.org/article/736389cf9aaf4a9e9e917490f3081c92
Publikováno v:
Entropy, Vol 26, Iss 8, p 667 (2024)
Remote data backup technology avoids the risk of data loss and tampering, and has higher security compared to local data backup solutions. However, the data transmission channel for remote data backup is not secure, and the backup server cannot be fu
Externí odkaz:
https://doaj.org/article/a752f5634bd848898562befeed8dbb9c
Publikováno v:
IEEE Access, Vol 11, Pp 45243-45254 (2023)
One of the fundamental construction blocks in safeguarding group communications is group key establishment protocols. Group key agreement protocols are more suitable for distributed environments where the participant from various places can agree upo
Externí odkaz:
https://doaj.org/article/f4f90d80ba1d4c42ac142897cfbed426
Autor:
Yu-Ru Lin, Justie Su-Tzu Juan
Publikováno v:
Engineering Proceedings, Vol 55, Iss 1, p 65 (2023)
A (k, n) visual cryptography (VCS) is used to build a system for secret sharing. The system divides a secret image (S) into n shares and recovers S by stacking shares bigger than or equal to k, while shares below k provide no information about S. The
Externí odkaz:
https://doaj.org/article/5845a1ad7fb647188d456a8f79811842
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Sergey V. Zapechnikov
Publikováno v:
Безопасность информационных технологий, Vol 29, Iss 2, Pp 46-56 (2022)
The paper is devoted to the analysis of privacy-preserving machine learning systems based on the concept of secure four-party computations. The advantages of the four-party computations over the two- and three-party computations are analyzed. The def
Externí odkaz:
https://doaj.org/article/2fad16dc3162494dbf0ea30e2c31f180
Autor:
Sergey V. Zapechnikov
Publikováno v:
Безопасность информационных технологий, Vol 29, Iss 1, Pp 30-43 (2022)
The paper is devoted to the analysis of privacy-preserving machine learning systems based on the concept of secure three-party computations. After general information about the purposes of secure multi-party computations and privacy-preserving machin
Externí odkaz:
https://doaj.org/article/0c3b4aba1ff84e65bdf1aea0f9503cf5