Academic literature on the topic 'Leakage resilient secret sharing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Leakage resilient secret sharing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Leakage resilient secret sharing"
Dai, ShuGuang, JinFeng Wei, and FangGuo Zhang. "Memory leakage-resilient secret sharing schemes." Science China Information Sciences 58, no. 11 (September 23, 2015): 1–9. http://dx.doi.org/10.1007/s11432-015-5385-8.
Full textLi, Ping, Shengjun Li, Hongyang Yan, Lishan Ke, Teng Huang, and Alzubair Hassan. "A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme." Complexity 2020 (March 13, 2020): 1–13. http://dx.doi.org/10.1155/2020/1784276.
Full textLabao, Alfonso, and Henry Adorna. "Cryptographic Rational Secret Sharing Schemes over General Networks." Cryptography 6, no. 4 (October 1, 2022): 50. http://dx.doi.org/10.3390/cryptography6040050.
Full textMaitra, Arpita, and Goutam Paul. "A Resilient Quantum Secret Sharing Scheme." International Journal of Theoretical Physics 54, no. 2 (June 26, 2014): 398–408. http://dx.doi.org/10.1007/s10773-014-2233-3.
Full textZhou, Yanwei, Bo Yang, Tao Wang, Zhe Xia, and Hongxia Hou. "Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings." Computer Journal 63, no. 4 (November 13, 2019): 508–24. http://dx.doi.org/10.1093/comjnl/bxz085.
Full textGuo, Yuyan, Jiguo Li, Mingming Jiang, Lei Yu, and Shimin Wei. "Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model." Security and Communication Networks 2020 (June 28, 2020): 1–11. http://dx.doi.org/10.1155/2020/1492681.
Full textHuang, Jianye, Qiong Huang, and Chunhua Pan. "A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting." International Journal of Foundations of Computer Science 28, no. 06 (September 2017): 761–80. http://dx.doi.org/10.1142/s0129054117400172.
Full textTang, Fei, Hongda Li, Qihua Niu, and Bei Liang. "Secure Mobile Agent from Leakage-Resilient Proxy Signatures." Mobile Information Systems 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/901418.
Full textZhang, Yinghui, Pengzhen Lang, Dong Zheng, Menglei Yang, and Rui Guo. "A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience." Security and Communication Networks 2018 (June 24, 2018): 1–13. http://dx.doi.org/10.1155/2018/7202598.
Full textTseng, Yuh–Min, Jui-Di Wu, Sen-Shan Huang, and Tung-Tso Tsai. "Leakage-Resilient Outsourced Revocable Certificateless Signature with a Cloud Revocation Server." Information Technology And Control 49, no. 4 (December 19, 2020): 464–81. http://dx.doi.org/10.5755/j01.itc.49.4.25927.
Full textDissertations / Theses on the topic "Leakage resilient secret sharing"
Chen, Guan-Wei, and 陳冠瑋. "Near Optimal Secret Sharing and Defense Resource Allocation Plans for QoS Constrained Information Leakage Minimization." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/76650438020223405520.
Full text國立臺灣大學
資訊管理學研究所
97
With the rapid prosperity of information systems and the Internet, most enterprises obtain competitive advantage by means of these information technologies. Hence, each enterprise uses the electronic equipment to store the sensitive information about core competence of the business. However, if the business secrets are leaked by opponents, it would lead to lose the competence and ruin their reputation for victims. For this reason, individuals or enterprises must protect the secrets from information leakage and ensure the availability for each legitimate user. As a result of the more criminal problems as time goes by, it becomes one of the important issues to develop effective defense strategies against information theft nowadays. In this thesis, we consider the network planning in the realm of the information security. The attack-defense scenario is formulated as the min-max mathematical model. In the inner problem, the attacker must allocate his/her limited attack budget to steal the sensitive information in order to cause maximal damage. In addition, the attacker could not reveal the secret unless he/she collects the enough number of shares and the corresponding decrypted key. On the other hand, in the outer problem, the network operator must construct the network topology and take account of the concept of defense-in-depth to design the most robust network. Furthermore, the combination of the secret sharing scheme and defense resource allocation strategy is applied for the sake of the confidentiality and availability. However, the attacker’s behavior is different from traditional attacks that he/she causes damage as soon as compromising nodes. Because of the consideration of the link malfunction, the network operator should not only guarantee the reliability of the network transmission but also satisfy the Quality-of-Service for legitimate users. The Lagrangean Relaxation-based algorithm and the subgradient-based algorithm are proposed to solve the two layer mathematical problem. Beside, we further formulate the independent single layer model for the initial network deployment problem and define the “Discrete Degree” metric to represent the impact of the attacker. The Simulated Annealing-based algorithm is applied to handle this problem. Finally, we evaluate the efficiency and effectiveness of the proposed algorithms by computational experiments.
Chen, Ding-Jie, and 陳鼎介. "An RST-Resilient Image Intellectual Property Protection Scheme Based on Fourier-Mellin Transform and Secret Sharing." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/13834369141719003666.
Full text大同大學
資訊工程學系(所)
94
In many watermarking systems, the main principle to retrieve the watermark is based on the knowledge of the positions for embedding the watermark. However, the geometric distortions rearrange the watermark embedding positions, and this often results in the failure of the watermark retrieval. In this thesis, the proposed scheme aims at resisting the rotation, scaling, and translation of the geometric distortions. The scheme contains a private share generation phase and a secret image retrieval phase. In the private share generation phase, the scheme employs the RST-invariant domain to obtain the feature share of the host image, and then generate the corresponding private share based on the secret sharing scheme for authentication. In the secret image retrieval phase, the feature share of the suspect image is retrieved from the RST-invariant domain, and then combined with the private share to regain the secret image for copyright authentication. The experimental results show that the scheme can withstand several attacks such as averaging, contrast adjustment, Gaussian blurring, JPEG compression, median filtering, Brightness-adjustment, sharpening, uniform noise adding, variance noise adding, slight affine transformation, slight pinching, slight punching, rescaling, lines removing, rotating, rotating with cropping, rotating with scaling, equalization, and print-and-scan.
Book chapters on the topic "Leakage resilient secret sharing"
Srinivasan, Akshayaram, and Prashant Nalini Vasudevan. "Leakage Resilient Secret Sharing and Applications." In Advances in Cryptology – CRYPTO 2019, 480–509. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-26951-7_17.
Full textNielsen, Jesper Buus, and Mark Simkin. "Lower Bounds for Leakage-Resilient Secret Sharing." In Advances in Cryptology – EUROCRYPT 2020, 556–77. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45721-1_20.
Full textDutta, Sabyasachi, and Reihaneh Safavi-Naini. "Leakage Resilient Cheating Detectable Secret Sharing Schemes." In Information Security and Privacy, 3–23. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90567-5_1.
Full textMaji, Hemanta K., Anat Paskin-Cherniavsky, Tom Suad, and Mingyuan Wang. "Constructing Locally Leakage-Resilient Linear Secret-Sharing Schemes." In Advances in Cryptology – CRYPTO 2021, 779–808. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-84252-9_26.
Full textMaji, Hemanta K., Hai H. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang, Xiuyu Ye, and Albert Yu. "Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family." In Theory of Cryptography, 355–83. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-22318-1_13.
Full textChandran, Nishanth, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, and Sruthi Sekar. "Short Leakage Resilient and Non-malleable Secret Sharing Schemes." In Advances in Cryptology – CRYPTO 2022, 178–207. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-15802-5_7.
Full textLi, Ping, Jin Li, and Alzubair Hassan. "Group Identification via Non-threshold Leakage-Resilient Secret Sharing Scheme." In Cyberspace Safety and Security, 234–41. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37352-8_20.
Full textChandran, Nishanth, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, and Sruthi Sekar. "Adaptive Extractors and Their Application to Leakage Resilient Secret Sharing." In Advances in Cryptology – CRYPTO 2021, 595–624. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-84252-9_20.
Full textXiong, Hao, Cong Zhang, Tsz Hon Yuen, Echo P. Zhang, Siu Ming Yiu, and Sihan Qing. "Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model." In Information and Communications Security, 119–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34129-8_11.
Full textMaji, Hemanta K., Hai H. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, and Mingyuan Wang. "Leakage-Resilience of the Shamir Secret-Sharing Scheme Against Physical-Bit Leakages." In Lecture Notes in Computer Science, 344–74. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77886-6_12.
Full textConference papers on the topic "Leakage resilient secret sharing"
Kumar, Ashutosh, Raghu Meka, and Amit Sahai. "Leakage-Resilient Secret Sharing Against Colluding Parties." In 2019 IEEE 60th Annual Symposium on Foundations of Computer Science (FOCS). IEEE, 2019. http://dx.doi.org/10.1109/focs.2019.00045.
Full textAdams, Donald Q., Hemanta K. Maji, Hai H. Nguyen, Minh L. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, and Mingyuan Wang. "Lower Bounds for Leakage-Resilient Secret-Sharing Schemes against Probing Attacks." In 2021 IEEE International Symposium on Information Theory (ISIT). IEEE, 2021. http://dx.doi.org/10.1109/isit45174.2021.9518230.
Full textMaji, Hemanta K., Hai H. Nguyen, Anat Paskin-Cherniavsky, and Mingyuan Wang. "Improved Bound on the Local Leakage-resilience of Shamir’s Secret Sharing." In 2022 IEEE International Symposium on Information Theory (ISIT). IEEE, 2022. http://dx.doi.org/10.1109/isit50566.2022.9834695.
Full textDziembowski, Stefan, and Krzysztof Pietrzak. "Intrusion-Resilient Secret Sharing." In 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07). IEEE, 2007. http://dx.doi.org/10.1109/focs.2007.4389495.
Full textDziembowski, Stefan, and Krzysztof Pietrzak. "Intrusion-Resilient Secret Sharing." In 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07). IEEE, 2007. http://dx.doi.org/10.1109/focs.2007.63.
Full textUkwandu, Elochukwu, William J. Buchanan, Lu Fan, Gordon Russell, and Owen Lo. "RESCUE: Resilient Secret Sharing Cloud-Based Architecture." In 2015 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2015. http://dx.doi.org/10.1109/trustcom.2015.459.
Full textJuarez-Sandoval, Oswaldo, Atoany Fierro-Radilla, Angelina Espejel-Trujillo, Mariko Nakano-Miyatake, and Hector Perez-Meana. "Cropping and noise resilient steganography algorithm using secret image sharing." In Sixth International Conference on Graphic and Image Processing (ICGIP 2014), edited by Yulin Wang, Xudong Jiang, and David Zhang. SPIE, 2015. http://dx.doi.org/10.1117/12.2179745.
Full textLiu, Shenchuan, Masaaki Fujiyoshi, and Hitoshi Kiya. "A leakage suppressed two-level security visual secret sharing scheme." In 2011 International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS 2011). IEEE, 2011. http://dx.doi.org/10.1109/ispacs.2011.6146169.
Full textAlmeida, Jose Bacelar, Manuel Barbosa, Gilles Barthe, Hugo Pacheco, Vitor Pereira, and Bernardo Portela. "Enforcing Ideal-World Leakage Bounds in Real-World Secret Sharing MPC Frameworks." In 2018 IEEE 31st Computer Security Foundations Symposium (CSF). IEEE, 2018. http://dx.doi.org/10.1109/csf.2018.00017.
Full textHsieh, Shang-Lin, Ding-Jie Chen, Bin-Yuan Huang, and I.-Ju Tsai. "An RST-resilient image copyright protection scheme based on the invariant domain and image secret sharing." In 2008 IEEE International Conference on Systems, Man and Cybernetics (SMC). IEEE, 2008. http://dx.doi.org/10.1109/icsmc.2008.4811422.
Full text