نتایج جستجو برای: secure information sharing

تعداد نتایج: 1254543  

2000
Ronald Cramer Ivan Damgård Ueli Maurer

We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set of n players can efficiently be based on any linear secret sharing scheme (LSSS) for the players, provided that the access structure of the LSSS allows MPC or VSS at all. Because an LSSS neither guarantees reconstructability when some shares are false, nor verifiability of a shared value, nor allow...

Journal: :IEICE Transactions 2005
Daisuke Hayashi Toshiyuki Miyamoto Shinji Doi Sadatoshi Kumagai

For mission-critical and safety-critical systems such as medical, financial, or administrative information systems, a secure and reliable storage system is indispensable. The main purpose of our research is to develop a highly secure and highly reliable storage system. We have proposed a storage system that utilizes a secret sharing scheme. The storage system is called the Secret Sharing Storag...

Journal: :International Astronomical Union Colloquium 1989

Journal: :World Electric Vehicle Journal 2023

Secure communication between connected electric vehicles is critical for realizing the full potential of Internet Vehicles. However, authentication and security information shared remains a major challenge. In this work, we propose blockchain-based data algorithm to enable secure sharing vehicles. Our leverages distributed ledger consensus mechanism blockchain technology overcome limitations tr...

Journal: :IET Information Security 2009
Mehrdad Nojoumian Douglas R. Stinson Morgan Grainger

We introduce the notion of a Social Secret Sharing Scheme, in which shares are allocated based on a player’s reputation and the way he interacts with other participants. During the social tuning phase, weights of players are adjusted such that participants who cooperate will end up with more shares than those who defect. Alternatively, newcomers are able to be enrolled in the scheme while corru...

Background and Aim: Proper management of the information process requires considering various definitions and combinations of the term "information". The purpose of this study was to clarify the concepts of information, misinformation and disinformation, and to better understand the ways of sharing, differentiation and relationships between them, and to explain the patterns and motivations for ...

2013
Zhaohong Wang Sen-ching Cheung

Many secure multiparty computation (SMC) protocols use Shamir’s Secret Sharing (SSS) scheme as a building block. A weakness of SSS is the possibility of collusion attacks among parties. Despite the shortcoming, SSS requires no data expansion and achieves information-theoretic security compared to other cryptographic SMC techniques such as garbled circuits. Moreover, it is much faster than other...

As knowledge is power, information is power in supply chains. It (information) provides the decision maker the power to get ahead of the competition, the power to run a business smoothly and efficiently, and the power to succeed in an ever more complex environment. Information plays a key role in the management of the supply chain. but how the different combination of information sharing based ...

H. Bypour M. Farhadi, R. Mortazavi

Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید