نتایج جستجو برای: secure information sharing

تعداد نتایج: 1254543  

2012
Dan Bogdanov Riivo Talviste Jan Willemson

We show how to collect and analyze financial data for a consortium of ICT companies using secret sharing and secure multiparty computation (MPC). This is the first time where the actual MPC computation on real data was done over the internet with computing nodes spread geographically apart. We describe the technical solution and present user feedback revealing that MPC techniques give sufficien...

Journal: :IEEE Wireless Communications 2023

With the rapid growth of handheld devices in internet things (IoT) networks, mobile applications have become ubiquitous everyday life. As technology is developed, so do also risks and threats associated with it, especially forthcoming quantum era. Existing IoT however, lack a quantum-resistant secret key sharing scheme to meet confidential message transmission demands wide-area applications. To...

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

2011
Gilad Asharov Yehuda Lindell Tal Rabin

In the setting of secure multiparty computation, a set of n parties with private inputs wish to jointly compute some functionality of their inputs. One of the most fundamental results of informationtheoretically secure computation was presented by Ben-Or, Goldwasser and Wigderson (BGW) in 1988. They demonstrated that any n-party functionality can be computed with perfect security, in the privat...

2010
G. K. Pradhan

To facilitate users to interact with and share information without difficulty and faultlessly across various networks and databases nationwide, a secure and trusted information-sharing environment has been recognized as an imperative requirement and to advance homeland security effort. The key incentive following this research is to build a secure and trusted information-sharing approach for go...

Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...

2009
Changlu Lin Lein Harn Dingfeng Ye

In a (t,n) secret sharing scheme, a mutually trusted dealer divides a secret into n shares in such a way that any t or more than t shares can reconstruct the secret, but fewer than t shares cannot reconstruct the secret. When there is no mutually trusted dealer, a (n,t,n) secret sharing scheme can be used to set up a (t,n) secret sharing because each shareholder also acts as a dealer to decide ...

2012
Armin Wasicek Thomas Mair

In this paper we discuss the application of integrity models in a mixed–criticality system to enable the secure sharing of information. The sharing of resources and information enables cost savings. It is the main driving factor in integrated architectures which are used to implement mixed–criticality real-time systems. The major challenge of these systems is simple: low criticality application...

2001
Min Wu Lik Mui Mojdeh Mohtashemi Peter Szolovits

To date, sharing patient health information across multiple institutions while maintaining patient privacy remains a dilemma. I introduce a secure health information sharing system, simply referred to as SHARE, for generating multi-center health studies, capable of securely sharing patient information across multiple clinical institutions. SHARE is a web-based computer system that automates mos...

2015
Ronald Cramer Ivan Damgård Jesper Buus Nielsen

In a data-driven society, individuals and companies encounter numerous situations where private information is an important resource. How can parties handle confidential data if they do not trust everyone involved? This text is the first to present a comprehensive treatment of unconditionally secure techniques for multiparty computation (MPC) and secret sharing. In a secure MPC, each party poss...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید