نتایج جستجو برای: secure information sharing
تعداد نتایج: 1254543 فیلتر نتایج به سال:
We show that verifiable secret sharing (VSS) and secure multi-party computation (MPC) among a set of n players can efficiently be based on any linear secret sharing scheme (LSSS) for the players, provided that the access structure of the LSSS allows MPC or VSS at all. Because an LSSS neither guarantees reconstructability when some shares are false, nor verifiability of a shared value, nor allow...
For mission-critical and safety-critical systems such as medical, financial, or administrative information systems, a secure and reliable storage system is indispensable. The main purpose of our research is to develop a highly secure and highly reliable storage system. We have proposed a storage system that utilizes a secret sharing scheme. The storage system is called the Secret Sharing Storag...
Secure communication between connected electric vehicles is critical for realizing the full potential of Internet Vehicles. However, authentication and security information shared remains a major challenge. In this work, we propose blockchain-based data algorithm to enable secure sharing vehicles. Our leverages distributed ledger consensus mechanism blockchain technology overcome limitations tr...
We introduce the notion of a Social Secret Sharing Scheme, in which shares are allocated based on a player’s reputation and the way he interacts with other participants. During the social tuning phase, weights of players are adjusted such that participants who cooperate will end up with more shares than those who defect. Alternatively, newcomers are able to be enrolled in the scheme while corru...
Background and Aim: Proper management of the information process requires considering various definitions and combinations of the term "information". The purpose of this study was to clarify the concepts of information, misinformation and disinformation, and to better understand the ways of sharing, differentiation and relationships between them, and to explain the patterns and motivations for ...
Many secure multiparty computation (SMC) protocols use Shamir’s Secret Sharing (SSS) scheme as a building block. A weakness of SSS is the possibility of collusion attacks among parties. Despite the shortcoming, SSS requires no data expansion and achieves information-theoretic security compared to other cryptographic SMC techniques such as garbled circuits. Moreover, it is much faster than other...
As knowledge is power, information is power in supply chains. It (information) provides the decision maker the power to get ahead of the competition, the power to run a business smoothly and efficiently, and the power to succeed in an ever more complex environment. Information plays a key role in the management of the supply chain. but how the different combination of information sharing based ...
Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید