نتایج جستجو برای: secure information sharing
تعداد نتایج: 1254543 فیلتر نتایج به سال:
We show how to collect and analyze financial data for a consortium of ICT companies using secret sharing and secure multiparty computation (MPC). This is the first time where the actual MPC computation on real data was done over the internet with computing nodes spread geographically apart. We describe the technical solution and present user feedback revealing that MPC techniques give sufficien...
With the rapid growth of handheld devices in internet things (IoT) networks, mobile applications have become ubiquitous everyday life. As technology is developed, so do also risks and threats associated with it, especially forthcoming quantum era. Existing IoT however, lack a quantum-resistant secret key sharing scheme to meet confidential message transmission demands wide-area applications. To...
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
In the setting of secure multiparty computation, a set of n parties with private inputs wish to jointly compute some functionality of their inputs. One of the most fundamental results of informationtheoretically secure computation was presented by Ben-Or, Goldwasser and Wigderson (BGW) in 1988. They demonstrated that any n-party functionality can be computed with perfect security, in the privat...
To facilitate users to interact with and share information without difficulty and faultlessly across various networks and databases nationwide, a secure and trusted information-sharing environment has been recognized as an imperative requirement and to advance homeland security effort. The key incentive following this research is to build a secure and trusted information-sharing approach for go...
Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...
In a (t,n) secret sharing scheme, a mutually trusted dealer divides a secret into n shares in such a way that any t or more than t shares can reconstruct the secret, but fewer than t shares cannot reconstruct the secret. When there is no mutually trusted dealer, a (n,t,n) secret sharing scheme can be used to set up a (t,n) secret sharing because each shareholder also acts as a dealer to decide ...
In this paper we discuss the application of integrity models in a mixed–criticality system to enable the secure sharing of information. The sharing of resources and information enables cost savings. It is the main driving factor in integrated architectures which are used to implement mixed–criticality real-time systems. The major challenge of these systems is simple: low criticality application...
To date, sharing patient health information across multiple institutions while maintaining patient privacy remains a dilemma. I introduce a secure health information sharing system, simply referred to as SHARE, for generating multi-center health studies, capable of securely sharing patient information across multiple clinical institutions. SHARE is a web-based computer system that automates mos...
In a data-driven society, individuals and companies encounter numerous situations where private information is an important resource. How can parties handle confidential data if they do not trust everyone involved? This text is the first to present a comprehensive treatment of unconditionally secure techniques for multiparty computation (MPC) and secret sharing. In a secure MPC, each party poss...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید