Journal articles on the topic 'Leakage resilient secret sharing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Leakage resilient secret sharing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Dai, ShuGuang, JinFeng Wei, and FangGuo Zhang. "Memory leakage-resilient secret sharing schemes." Science China Information Sciences 58, no. 11 (September 23, 2015): 1–9. http://dx.doi.org/10.1007/s11432-015-5385-8.
Full textLi, Ping, Shengjun Li, Hongyang Yan, Lishan Ke, Teng Huang, and Alzubair Hassan. "A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme." Complexity 2020 (March 13, 2020): 1–13. http://dx.doi.org/10.1155/2020/1784276.
Full textLabao, Alfonso, and Henry Adorna. "Cryptographic Rational Secret Sharing Schemes over General Networks." Cryptography 6, no. 4 (October 1, 2022): 50. http://dx.doi.org/10.3390/cryptography6040050.
Full textMaitra, Arpita, and Goutam Paul. "A Resilient Quantum Secret Sharing Scheme." International Journal of Theoretical Physics 54, no. 2 (June 26, 2014): 398–408. http://dx.doi.org/10.1007/s10773-014-2233-3.
Full textZhou, Yanwei, Bo Yang, Tao Wang, Zhe Xia, and Hongxia Hou. "Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings." Computer Journal 63, no. 4 (November 13, 2019): 508–24. http://dx.doi.org/10.1093/comjnl/bxz085.
Full textGuo, Yuyan, Jiguo Li, Mingming Jiang, Lei Yu, and Shimin Wei. "Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model." Security and Communication Networks 2020 (June 28, 2020): 1–11. http://dx.doi.org/10.1155/2020/1492681.
Full textHuang, Jianye, Qiong Huang, and Chunhua Pan. "A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting." International Journal of Foundations of Computer Science 28, no. 06 (September 2017): 761–80. http://dx.doi.org/10.1142/s0129054117400172.
Full textTang, Fei, Hongda Li, Qihua Niu, and Bei Liang. "Secure Mobile Agent from Leakage-Resilient Proxy Signatures." Mobile Information Systems 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/901418.
Full textZhang, Yinghui, Pengzhen Lang, Dong Zheng, Menglei Yang, and Rui Guo. "A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience." Security and Communication Networks 2018 (June 24, 2018): 1–13. http://dx.doi.org/10.1155/2018/7202598.
Full textTseng, Yuh–Min, Jui-Di Wu, Sen-Shan Huang, and Tung-Tso Tsai. "Leakage-Resilient Outsourced Revocable Certificateless Signature with a Cloud Revocation Server." Information Technology And Control 49, no. 4 (December 19, 2020): 464–81. http://dx.doi.org/10.5755/j01.itc.49.4.25927.
Full textWu, Zhen, Yining Liu, and Xingxing Jia. "A Novel Hierarchical Secret Image Sharing Scheme with Multi-Group Joint Management." Mathematics 8, no. 3 (March 19, 2020): 448. http://dx.doi.org/10.3390/math8030448.
Full textZhang, Xiujie, Xingbing Fu, Lu Hong, Yu Liu, and Liangliang Wang. "Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network." International Journal of Distributed Sensor Networks 16, no. 6 (June 2020): 155014772092873. http://dx.doi.org/10.1177/1550147720928733.
Full textZhao, Xuemei, Tongtong Zhang, Jun Liu, Canju Lu, Huan Lu, and Xuehu Yan. "Applying Secret Image Sharing to Economics." International Journal of Digital Crime and Forensics 13, no. 4 (July 2021): 16–25. http://dx.doi.org/10.4018/ijdcf.20210701.oa2.
Full textQihong Yu, Qihong Yu, Jian Shen Qihong Yu, Jin-Feng Lai Jian Shen, and Sai Ji Jin-Feng Lai. "Continuous Leakage-resilient and Hierarchical Identity-based Online/Offline Encryption." 網際網路技術學刊 23, no. 6 (November 2022): 1287–96. http://dx.doi.org/10.53106/160792642022112306011.
Full textZhang, Yinghui, Menglei Yang, Dong Zheng, Tiantian Zhang, Rui Guo, and Fang Ren. "Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity." International Journal of Foundations of Computer Science 30, no. 04 (June 2019): 665–81. http://dx.doi.org/10.1142/s0129054119400197.
Full textLabao, Alfonso, and Henry Adorna. "A CCA-PKE Secure-Cryptosystem Resilient to Randomness Reset and Secret-Key Leakage." Cryptography 6, no. 1 (January 4, 2022): 2. http://dx.doi.org/10.3390/cryptography6010002.
Full textChen, Xiu-Bo, Gang Xu, Yuan Su, and Yi-Xian Yang. "Robust variations of secret sharing through noisy quantum channel." Quantum Information and Computation 14, no. 7&8 (May 2014): 589–607. http://dx.doi.org/10.26421/qic14.7-8-4.
Full textZhang, En, Peiyan Yuan, and Jiao Du. "Verifiable Rational Secret Sharing Scheme in Mobile Networks." Mobile Information Systems 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/462345.
Full textZhenhua Tan, Danke Wu, Hong Li, Tianhan Gao, and Nan Guo. "Hierarchical Threshold Secret Image Sharing Scheme Based on Birkhoff Interpolation and Matrix Projection." Research Briefs on Information and Communication Technology Evolution 4 (October 15, 2018): 125–33. http://dx.doi.org/10.56801/rebicte.v4i.73.
Full textZhang, Li-na, Jia-qi Sun, Xiao-yu Zhang, Qing-peng Chen, and Jing Zhang. "Two-level QR code scheme based on region matrix image secret sharing algorithm." Mathematical Biosciences and Engineering 20, no. 9 (2023): 16678–704. http://dx.doi.org/10.3934/mbe.2023743.
Full textAlawatugoda, Janaka. "Public-Key Encryption In The Standard Model Against Strong Leakage Adversary." Computer Journal 63, no. 12 (June 3, 2020): 1904–14. http://dx.doi.org/10.1093/comjnl/bxaa055.
Full textSharma, Shantanu, Yin Li, Sharad Mehrotra, Nisha Panwar, Komal Kumari, and Swagnik Roychoudhury. "Information-Theoretically Secure and Highly Efficient Search and Row Retrieval." Proceedings of the VLDB Endowment 16, no. 10 (June 2023): 2391–403. http://dx.doi.org/10.14778/3603581.3603582.
Full textLiu, Yuan, Licheng Wang, Xiaoying Shen, Lixiang Li, and Dezhi An. "Space-Efficient Key-Policy Attribute-Based Encryption from Lattices and Two-Dimensional Attributes." Security and Communication Networks 2020 (August 7, 2020): 1–11. http://dx.doi.org/10.1155/2020/2345369.
Full textBras-Amorós. "Ideals of Numerical Semigroups and Error-Correcting Codes." Symmetry 11, no. 11 (November 14, 2019): 1406. http://dx.doi.org/10.3390/sym11111406.
Full textYu, Qihong, Jiguo Li, and Sai Ji. "Hierarchical Identity-Based Online/Offline Encryption Scheme with Leakage Resilience." Security and Communication Networks 2022 (November 30, 2022): 1–11. http://dx.doi.org/10.1155/2022/6849761.
Full textXU, JUAN, HANWU CHEN, and ZHIHAO LIU. "A SIMPLE AND SECURE QUANTUM SECRET SHARING SCHEME BASED ON PRODUCT STATES." International Journal of Quantum Information 10, no. 03 (April 2012): 1250031. http://dx.doi.org/10.1142/s0219749912500311.
Full textR, Nesamalar, and Dr Ravikumar K. "Proficient and Safe Token with Secret and Public Keys Sharing Algorithm for Preventing Cryptographic Key Leakage in Wireless Sensor Network." International Journal of Engineering Research in Electronics and Communication Engineering 9, no. 9 (August 30, 2022): 1–6. http://dx.doi.org/10.36647/ijerece/09.09.a001.
Full textPrabhu, Mr S., Veeramani P, Santhosh kumar C, and Vijay M. "Watermarking and Encryption Technique to Avoid Data Leakage Based on Block Chain." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 867–71. http://dx.doi.org/10.22214/ijraset.2023.51633.
Full textZhao, Yi, Kaitai Liang, Bo Yang, and Liqun Chen. "CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs." Security and Communication Networks 2019 (October 31, 2019): 1–8. http://dx.doi.org/10.1155/2019/8357241.
Full textChhabra, Sakshi, and Ashutosh Kumar Singh. "Security Enhancement in Cloud Environment using Secure Secret Key Sharing." Journal of communications software and systems 16, no. 4 (July 20, 2020): 296–307. http://dx.doi.org/10.24138/jcomss.v16i3.964.
Full textPavlov, Maksym, and Iryna Yurchak. "Software Implementation of Modified LSB Algorithm with Shamir`s Secret Sharing." Advances in Cyber-Physical Systems 7, no. 2 (December 16, 2022): 130–39. http://dx.doi.org/10.23939/acps2022.02.130.
Full textQin, Su-Juan, and Feng Liu. "Information Leakage in Quantum Secret Sharing of Multi-Bits by an Entangled Six-Qubit State." International Journal of Theoretical Physics 53, no. 9 (April 16, 2014): 3116–23. http://dx.doi.org/10.1007/s10773-014-2108-7.
Full textFeng, Tao, Dewei Wang, and Renbin Gong. "A Blockchain-Based Efficient and Verifiable Attribute-Based Proxy Re-Encryption Cloud Sharing Scheme." Information 14, no. 5 (May 9, 2023): 281. http://dx.doi.org/10.3390/info14050281.
Full textZhang, Lina, Tong Wang, Xiangqin Zheng, Junhan Yang, and Liping Lv. "Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things." Security and Communication Networks 2021 (November 12, 2021): 1–12. http://dx.doi.org/10.1155/2021/1721925.
Full textHwang, Yong-Woon, Su-Hyun Kim, Daehee Seo, and Im-Yeong Lee. "An SKP-ABE Scheme for Secure and Efficient Data Sharing in Cloud Environments." Wireless Communications and Mobile Computing 2022 (June 17, 2022): 1–18. http://dx.doi.org/10.1155/2022/1384405.
Full textBhagat, Payal, and Amar Buchade. "A Survey on Leakage-Resilient KASE for Group Data Sharing with Auxiliary Input via Cloud Storage." IJARCCE 6, no. 4 (April 30, 2017): 95–98. http://dx.doi.org/10.17148/ijarcce.2017.6419.
Full textLiu, Chenlei, Feng Xiang, and Zhixin Sun. "Multiauthority Attribute-Based Access Control for Supply Chain Information Sharing in Blockchain." Security and Communication Networks 2022 (April 12, 2022): 1–18. http://dx.doi.org/10.1155/2022/8497628.
Full textLi, Zhenfei, Malin Premaratne, and Weiren Zhu. "Advanced encryption method realized by secret shared phase encoding scheme using a multi-wavelength metasurface." Nanophotonics 9, no. 11 (July 4, 2020): 3687–96. http://dx.doi.org/10.1515/nanoph-2020-0298.
Full textZhang, Wenbo, Jing Zhang, Yifei Shi, and Jingyu Feng. "UIV-TSP: A Blockchain-Enabled Antileakage Sharing Protection Scheme for Undisclosed IIoT Vulnerabilities." Security and Communication Networks 2022 (October 10, 2022): 1–17. http://dx.doi.org/10.1155/2022/2500213.
Full textKu-Cauich, Juan Carlos, and Guillermo Morales-Luna. "A linear code based on resilient Boolean maps whose dual is a platform for a robust secret sharing scheme." Linear Algebra and its Applications 596 (July 2020): 216–29. http://dx.doi.org/10.1016/j.laa.2020.03.010.
Full textSona, G., P. Annapandi, and Boopathy Yamni. "Inscribing in to an Control Attempt against Jammer Attack Using FB Decoding Mechanism." Applied Mechanics and Materials 573 (June 2014): 412–17. http://dx.doi.org/10.4028/www.scientific.net/amm.573.412.
Full textPeeters, Roel, Dave Singelée, and Bart Preneel. "Threshold-Based Location-Aware Access Control." International Journal of Handheld Computing Research 2, no. 3 (July 2011): 22–37. http://dx.doi.org/10.4018/jhcr.2011070102.
Full textLong, Jing, Dafang Zhang, Wei Liang, and Xia'an Bi. "Signature Restoration for Enhancing Robustness of FPGA IP Designs." International Journal of Information Security and Privacy 9, no. 3 (July 2015): 41–56. http://dx.doi.org/10.4018/ijisp.2015070103.
Full textMa, Chunguang, Juyan Li, and Weiping Ouyang. "Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment." International Journal of Foundations of Computer Science 28, no. 06 (September 2017): 645–60. http://dx.doi.org/10.1142/s0129054117400111.
Full textDamgård, Ivan, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter, and Michael Bæksvang Østergaard. "Fast threshold ECDSA with honest majority1." Journal of Computer Security 30, no. 1 (January 20, 2022): 167–96. http://dx.doi.org/10.3233/jcs-200112.
Full textPasserini, Federico, and Andrea M. Tonello. "Secure PHY Layer Key Generation in the Asymmetric Power Line Communication Channel." Electronics 9, no. 4 (April 2, 2020): 605. http://dx.doi.org/10.3390/electronics9040605.
Full textZhang, Denghui, Lijing Ren, Muhammad Shafiq, and Zhaoquan Gu. "A Privacy Protection Framework for Medical Image Security without Key Dependency Based on Visual Cryptography and Trusted Computing." Computational Intelligence and Neuroscience 2023 (January 31, 2023): 1–11. http://dx.doi.org/10.1155/2023/6758406.
Full textZhang, Lizhe, Zhenghang You, Kenian Wang, and Zihan Cui. "Research on Access Control Scheme of System Wide Information Management Based on Attribute Association." Security and Communication Networks 2022 (May 30, 2022): 1–15. http://dx.doi.org/10.1155/2022/6181995.
Full textLavanya, D. L., R. Ramaprabha, and K. Gunaseelan. "Privacy Preserving Physical Layer Authentication Scheme for LBS based Wireless Networks." Defence Science Journal 71, no. 2 (March 10, 2021): 241–47. http://dx.doi.org/10.14429/dsj.71.15355.
Full textMing, Yang, and Tingting Zhang. "Efficient Privacy-Preserving Access Control Scheme in Electronic Health Records System." Sensors 18, no. 10 (October 18, 2018): 3520. http://dx.doi.org/10.3390/s18103520.
Full text