نتایج جستجو برای: secure information sharing

تعداد نتایج: 1254543  

2005
Prasenjit Mitra Peng Liu Chi-Chun Pan

Increasingly, there is a recognized need for secure information sharing. In order to implement information sharing between diverse organizations, we need privacypreserving interoperation systems. In this work, we describe two frameworks for privacy-preserving interoperation systems. Ontology matching is an indispensable component of interoperation systems. To implement privacy-preserving intero...

2008
Zhan-jun Zhang Yong Li

Based on a quantum secure direct communication (QSDC) protocol [Phys. Rev. A69(04)052319], we propose a (n, n)-threshold scheme of multiparty quantum secret sharing of classical messages (QSSCM) using only single photons. We take advantage of this multiparty QSSCM scheme to establish a scheme of multiparty secret sharing of quantum information (SSQI), in which only all quantum information recei...

2007
Amitanand S. Aiyer Lorenzo Alvisi Allen Clement Harry C. Li

We present Information Theoretically secure Byzantine Paxos (IT ByzPaxos), the first deterministic asynchronous Byzantine consensus protocol that is provably secure despite a computationally unbounded adversary. Previous deterministic asynchronous algorithms for Byzantine consensus rely on unproven number theoretic assumptions (i.e., digital signatures) to maintain agreement. IT ByzPaxos instea...

2013
Abdulrakeeb M. Al-Ssulami

Secret sharing schemes (SSS) are very important, because they are used in critical applications such as e-voting, cryptographic key distribution and sharing, secure online auctions, information hiding, and secure multiparty computation. We explained some popular algorithms of secret sharing such as threshold, graph, and visual schemes and their access structures. Besides, we discussed the limit...

2014
Yuan Hong Jaideep Vaidya Haibing Lu Lingyu Wang

With increasing resource constraints, optimization is necessary to make the best use of scarce resources. Given the ubiquitous connectivity and availability of information, collaborative optimization problems can be formulated by different parties to jointly optimize their operations. However, this cannot usually be done without restraint since privacy/security concerns often inhibit the comple...

2017
Daniel Berend Dor Bitan Shlomi Dolev William Frankel

One of the most interesting research topics in cryptography is nding schemes for an e cient fully-homomorphic encryption (FHE), preferably information-theoretically secure schemes, which are not based on unproven computational hardness assumptions. The greatest breakthrough in this eld was made by Gentry [11] in 2009, and since then there were some interesting developments, e.g., Boneh et al. [...

2007
Ronald Cramer Ivan Damgård Robbert de Haan

We consider the standard secure multi-party multiplication protocol due to M. Rabin. This protocol is based on Shamir’s secret sharing scheme and it can be viewed as a practical variation on one of the central techniques in the foundational results of Ben-Or, Goldwasser, and Wigderson and Chaum, Crépeau, and Damgaard on secure multi-party computation. Rabin’s idea is a key ingredient to virtual...

2004
Stanley R. M. Oliveira Osmar R. Zaïane Yücel Saygin

The sharing of association rules is often beneficial in industry, but requires privacy safeguards. One may decide to disclose only part of the knowledge and conceal strategic patterns which we call restrictive rules. These restrictive rules must be protected before sharing since they are paramount for strategic decisions and need to remain private. To address this challenging problem, we propos...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید