نتایج جستجو برای: secure information sharing

تعداد نتایج: 1254543  

2010
Flavio D. Garcia Bart Jacobs

The first part of this paper discusses developments wrt. smart (electricity) meters (simply called E-meters) in general, with emphasis on security and privacy issues. The second part will be more technical and describes protocols for secure communication with E-meters and for fraud detection (leakage) in a privacy-preserving manner, using a combination of Paillier’s additive homomorphic encrypt...

2004
Wenjing Lou Wei Yuguang Fang

This paper considers the delivery of secret information across insecure networks. A novel end-to-end multipath secure data delivery scheme, Secure Protocol for REIiable dAta Delivery (SPREAD), is proposed as a complementary mechanism for the data confidentiality service in the public networks. The idea behind SPREAD is io improve the confidentiality by enforcing the secret sharing principle in ...

2009
Nikhil Swamy

Executive Summary Reliable and timely sharing of information across a community of collaborating principals is an integral part of Microsoft's vision of the " new world of work " [30]. Examples of Microsoft's investment in this vision abound. For one, Sharepoint specifically aims to share information assets across teams, departments, and organizations while maintaining IT control. Tools like On...

2006
Jehn-Ruey Jiang Hsuan Chuang

A perfect secret sharing scheme permits a secret to be shared among participants so that only qualified subsets of participants can reconstruct the secret, but any unqualified subset has absolutely no information about the secret. In this paper, we first show that the general secret sharing scheme with a coterie access structure is perfect if the coterie is nondominated (ND). We then propose a ...

Journal: :CoRR 2014
V. P. Binu A. Sreekumar

Multi secret sharing is an extension of secret sharing technique where several secrets are shared between the participants, each according to a specified access structure.The secrets can be reconstructed according to the access structure by participants using their private shares.Each participant has to hold a single share, additional information are made available in a public bulletin board.Th...

1995
Rosario Gennaro

Veriiable Secret Sharing is a fundamental primitive for secure cryptographic design. We present a stronger notion of veriiable secret sharing and exhibit a protocol implementing it. We show that our new notion is preferable to the old ones whenever veriiable secret sharing is used as a tool within larger protocols, rather than being a goal in itself. Indeed our deenition, and so our protocol sa...

Journal: :PeerJ PrePrints 2017
Elham Shahab Hadi Abdolrahimpour

Secret sharing approach and in particular Visual Cryptography (VC) try to address the security issues in dealing with images. In fact, VC is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography. VC takes an image (secret) as an input and encrypts (divide) into two or more pieces (shares) that each of them can not reveal any information about the m...

The main purpose of this study is to investigate the effect of human resources information systems on knowledge sharing through the mediation of organizational culture in Branches of Mellat Bank in Shiraz city. In this study, the key indicators for each variable of the study (human resources information systems, knowledge sharing and knowledge-based organizational culture) was given. then, they...

2011
Ignacio Cascudo Ronald Cramer Chaoping Xing

An (n, t, d, n−t)-arithmetic secret sharing scheme (with uniformity) for Fq over Fq is an Fq-linear secret sharing scheme where the secret is selected from Fq and each of the n shares is an element of Fq. Moreover, there is t-privacy (in addition, any t shares are uniformly random in Fq) and, if one considers the d-fold “component-wise” product of any d sharings, then the d-fold component-wise ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید