Academic literature on the topic 'Partage de Secret Homomorphe'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Partage de Secret Homomorphe.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Partage de Secret Homomorphe"
Verdier, Pierre. "Secret professionnel et partage des informations." Journal du droit des jeunes 269, no. 9 (2007): 8. http://dx.doi.org/10.3917/jdj.269.0008.
Full textAgrali, Sibel. "Le secret professionnel et le partage d’informations." Mémoires N° 69, no. 1 (March 1, 2017): 8–9. http://dx.doi.org/10.3917/mem.069.0008.
Full textGrangé, Ninon. "Le secret, un partage baroque du politique." Rue Descartes N°98, no. 2 (2020): 14. http://dx.doi.org/10.3917/rdes.098.0014.
Full textCapodano, Jeanne. "Secret professionnel et partage d’informations. Les nouvelles dispositions de la loi Santé." VST - Vie sociale et traitements 132, no. 4 (2016): 84. http://dx.doi.org/10.3917/vst.132.0084.
Full textMarcelli, Aline. "Le secret professionnel du médecin et son partage entre soignants et non soignants." Bulletin de l'Académie Nationale de Médecine 190, no. 6 (June 2006): 1247–60. http://dx.doi.org/10.1016/s0001-4079(19)33232-7.
Full textWarusfel, Bertrand. "Renseignement et séparation des pouvoirs en France." Études françaises de renseignement et de cyber N° 1, no. 1 (November 23, 2023): 55–72. http://dx.doi.org/10.3917/efrc.231.0055.
Full textClímaco, Cristina. "La résistance républicaine à la dictature militaire et à l’ Estado Novo : les pratiques de la lutte clandestine (1926-1939)." Sigila N° 52, no. 2 (December 22, 2023): 77–87. http://dx.doi.org/10.3917/sigila.052.0077.
Full textDerrida, Jacques. "Le parjure, peut-être (« brusques sautes de syntaxe »)." Études françaises 38, no. 1-2 (August 18, 2004): 15–57. http://dx.doi.org/10.7202/008390ar.
Full textJulien, Germain, and Denys Trudel. "Bilan de la recherche sur l'administration publique québécoise." Dossiers 16, no. 3 (April 12, 2005): 413–38. http://dx.doi.org/10.7202/055705ar.
Full textMAGORD, Claire. "Les enjeux du secret et du partage de l’information." La Revue du Centre Michel de L'Hospital, no. 20 (March 9, 2020). http://dx.doi.org/10.52497/revue-cmh.97.
Full textDissertations / Theses on the topic "Partage de Secret Homomorphe"
Meyer, Pierre. "Sublinear-communication secure multiparty computation." Electronic Thesis or Diss., Université Paris Cité, 2023. http://www.theses.fr/2023UNIP7129.
Full textSecure Multi-Party Computation (MPC) [Yao82, GMW87a] allows a set of mutually distrusting parties to perform some joint computation on their private inputs without having to reveal anything beyond the output. A major open question is to understand how strongly the communication complexity of MPC and the computational complexity of the function being computed are correlated. An intriguing starting point is the study of the circuit-size barrier. The relevance of this barrier is a historical, and potentially absolute, one: all seminal protocols from the 1980s and 1990s use a "gate-by-gate" approach, requiring interaction between the parties for each (multiplicative) gate of the circuit to be computed, and this remains the state of the art if we wish to provide the strongest security guarantees. The circuit-size barrier has been broken in the computational setting from specific, structured, computational assumption, via Fully Homomorphic Encryption (FHE) [Gen09] and later Homomorphic Secret Sharing [BGI16a]. Additionally, the circuit-size barrier for online communication has been broken (in the correlated randomness model) information-theoretically [IKM + 13, DNNR17, Cou19], but no such result is known for the total communication complexity (in the plain model). Our methodology is to draw inspiration from known approaches in the correlated randomness model, which we view simultaneously as fundamental (because it provides information-theoretic security guarantees) and inherently limited (because the best we can hope for in this model is to understand the online communication complexity of secure computation), in order to devise new ways to break the circuit-size barrier in the computational setting. In the absence of a better way to decide when concrete progress has been made, we take extending the set of assumptions known to imply sublinear-communication secure computation as "proof of conceptual novelty". This approach has allowed us to break the circuit-size barrier under quasipolynomial LPN [CM21] or QR and LPN [BCM22]. More fundamentally, these works constituted a paradigm shift, away from the "homomorphism-based" approaches of FHE and HSS, which ultimately allowed us to break the two-party barrier for sublinear-communication secure computation and provide in [BCM23] the first sublinear-communication protocol with more than two parties, without FHE. Orthogonally to this line of work, purely focusing on computational security, we showed in [CMPR23] that [BGI16a] could be adapted to provide information-theoretic security for one of the two parties, and computational security for the other: these are provably the strongest security guarantees one can hope to achieve in the two-party setting (without setup), and ours is the first sublinear-communication protocol in this setting which does not use FHE
Huysmans, Guillaume. "Partage de secret : integrite, performances et applications." Aix-Marseille 2, 1998. http://www.theses.fr/1998AIX22032.
Full textKaced, Tarik. "Partage de secret et théorie algorithmique de l'information." Phd thesis, Université Montpellier II - Sciences et Techniques du Languedoc, 2012. http://tel.archives-ouvertes.fr/tel-00763117.
Full textKaced, Tarik. "Partage de secret et théorie algorithmique de l'information." Thesis, Montpellier 2, 2012. http://www.theses.fr/2012MON20170/document.
Full textOur work deals with secret sharing in the theoretical point of views of Shannon's Information Theory and Kolmogorov's Algorithmic Information Theory. We are going to explain how these three subjects are naturally deeply intertwined.Information inequalities play a central role in this text. They are the inequalities for Shannon entropy, but also they are in exact correspondence with the inequalities for Kolmogorov complexity. Kolmogorov complexity formalizes the idea of randomness for strings.These two reasons alone justify to consider the notion of secret sharing in the Algorithmic framework (if one can share a random secret one can share anything).Originally, secret sharing was first studied under the combinatorial lens, only later was it more generally formalized using information-theoretic measures. This step allowed the use of information inequalities which revealed to bevery important to understand the existence of secret-sharing schemes with respect to efficiency.The investigation of information inequalities is at its debut. We contribute to the subject by introducing the notion of essentially conditional inequalities, which shows once again that information inequalities are yet not fully understood
Breton-Rahali, Céline. "Le secret professionnel et l’action médico-sociale." Thesis, Université de Lorraine, 2014. http://www.theses.fr/2014LORR0355.
Full textProfessional confidentiality, understood as the obligation not to reveal certain information, is the subject of a number of exceptions. Its study within the particular context of specialised institutions reveals a number of issues. First, professionals working together from different disciplines are each subject to a different patchwork of applicable standards. As a result, it is necessary to clarify these rules, both within the interests of professionals and health-care users. Second, the effectiveness of patient care requires coordination between different professionals based upon shared confidentiality within the same department or health-care centre. Collaboration between professionals is an issue not only affecting the quality of care but also one of economics which allows for the effective management of the supply of health and social care within a given area. As a major challenge of public health policy, such coordination provokes a consideration of the adaptation of the existing legal framework and that of the organisation of the means of sharing confidential patient information within the health care system as a whole for both medical and social care services. This thesis makes a proposal for the necessary amendments to the current legislative framework for derogating from the general principle of confidentiality to allow for an exchange of information between professionals involved in the care of a patient. The evolution of shared confidentiality for the benefit of the patient requires an emphasis upon determining the most highly protective regime for patients without compromising the reality – and constraints – of providing effective health care
Renner, Soline. "Protection des algorithmes cryptographiques embarqués." Thesis, Bordeaux, 2014. http://www.theses.fr/2014BORD0057/document.
Full textSince the late 90s, the implementation of cryptosystems on smart card faces two kinds of attacks : side-channel attacks and fault injection attacks. Countermeasures are then developed and validated by considering a well-defined attacker model. This thesis focuses on the protection of symmetric cryptosystems against side-channel attacks. Specifically, we are interested in masking countermeasures in order to tackle high-order attacks for which an attacker is capable of targeting t intermediate values. After recalling the analogy between masking countermeasures and secret sharing schemes, the construction of secret sharing schemes from linear codes introduced by James L. Massey in 1993 is presented.By adapting this construction together with tools from the field of Multi-Party Computation, we propose a generic masking countermeasure resistant to high-order attacks. Furthermore, depending on the cryptosystem to protect, this solution optimizes the cost of the countermeasure by selecting the most appropriate code. In this context, we propose two countermeasures to implement the AES cryptosystem. The first is based on a family of evaluation codes similar to the Reed Solomon code used in the secret sharing scheme of Shamir. The second considers the family of self-dual and self-orthogonal codes generated by a matrix defined over GF(2) or GF(4). These two alternatives are more effective than masking countermeasures from 2011 based on Shamir's secret sharing scheme. Moreover, for t=1, the second solution is competitive with usual solutions
Attasena, Varunya. "Secret sharing approaches for secure data warehousing and on-line analysis in the cloud." Thesis, Lyon 2, 2015. http://www.theses.fr/2015LYO22014/document.
Full textCloud business intelligence is an increasingly popular solution to deliver decision support capabilities via elastic, pay-per-use resources. However, data security issues are one of the top concerns when dealing with sensitive data. Many security issues are raised by data storage in a public cloud, including data privacy, data availability, data integrity, data backup and recovery, and data transfer safety. Moreover, security risks may come from both cloud service providers and intruders, while cloud data warehouses should be both highly protected and effectively refreshed and analyzed through on-line analysis processing. Hence, users seek secure data warehouses at the lowest possible storage and access costs within the pay-as-you-go paradigm.In this thesis, we propose two novel approaches for securing cloud data warehouses by base-p verifiable secret sharing (bpVSS) and flexible verifiable secret sharing (fVSS), respectively. Secret sharing encrypts and distributes data over several cloud service providers, thus enforcing data privacy and availability. bpVSS and fVSS address five shortcomings in existing secret sharing-based approaches. First, they allow on-line analysis processing. Second, they enforce data integrity with the help of both inner and outer signatures. Third, they help users minimize the cost of cloud warehousing by limiting global share volume. Moreover, fVSS balances the load among service providers with respect to their pricing policies. Fourth, fVSS improves secret sharing security by imposing a new constraint: no cloud service provide group can hold enough shares to reconstruct or break the secret. Five, fVSS allows refreshing the data warehouse even when some service providers fail. To evaluate bpVSS' and fVSS' efficiency, we theoretically study the factors that impact our approaches with respect to security, complexity and monetary cost in the pay-as-you-go paradigm. Moreover, we also validate the relevance of our approaches experimentally with the Star Schema Benchmark and demonstrate its superiority to related, existing methods
Beugnon, Sébastien. "Sécurisation des maillages 3D pour l'industrie de la chaussure et la maroquinerie." Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS097.
Full textWith the increase of data exchange and latest technological and social developments, multimedia contents are becoming an important part of global trafic. Today, 3D objects are used in a large number of applications, for example, medical applications, simulations, video games, animation and special effects. 3D object usage by the general public has become a lucrative market that can take the form of 3D object downloading platforms with various 3D formats.This thesis, in collaboration with the company STRATEGIES, concerns the 3D object protection, and more particularly 3D meshes against fradulent and illegal uses. These 3D meshes represent surface models of shoes and leather goods produced by customers using digital solutions proposed by STRATEGIES. First, we propose a new method to insert secret data much more efficiently in terms of execution time on very large meshes than the previous method developed in collaboration with the company STRATEGIES. We are also exploring selective encryption approaches to control access to very high quality content according to user needs. In this context, we propose to use selective encryption approaches on the geometric data of 3D objects in order to protect the visual content of these objects according to different use cases and different data representations.In a second research axis, we study the application of secret sharing methods to the domain of 3D objects. Secret sharing is an approach that seeks to divide secret content between multiple users and allows certain subgroups of users to reconstruct the secret. Secret sharing is a redundancy system that allows you to reconstruct the secret even if some users have lost their information. Secret 3D object sharing is a poorly researched domain used to protect a 3D object between collaborators. We propose new secret 3D object sharing methods using selective encryption approaches and providing hierarchical properties where users have different access rights to 3D content based on their position in a hierarchical structure.Finally, the third research axis developed in this thesis deals with the analysis of the visual confidentiality of 3D objects selectively encrypted more or less strongly. Indeed, depending on the scenario, our 3D selective encryption methods provide results that can be more or less recognizable by users. However, the metrics used to evaluate the quality of 3D objects do not distinguish two selectively encrypted 3D objects with different levels of confidentiality. So, we present the construction of a databse of selectively encrypted 3D objects in order to realize subjective assessments of visual confidentiality and try to build a new metric correlated with evaluations obtained by the human visual system
Hoang, Bao Thien. "Problème de sondage dans les réseaux sociaux décentralisés." Thesis, Université de Lorraine, 2015. http://www.theses.fr/2015LORR0016/document.
Full textOne of the current practical, useful but sensitive topic in social networks is polling problem where the privacy of exchanged information and user reputation are very critical. Indeed, users want to preserve the confidentiality of their votes and to hide, if any, their misbehaviors. Recently, Guerraoui et al. proposed polling protocols based on simple secret sharing scheme and without requiring any central authority or cryptography system. However these protocols can be deployed safely and efficiently provided that the social graph structure should be transformed into a ring structure-based overlay and the number of participating users is perfect square. In this thesis, we address the problem of deploying decentralized polling protocols for general social graphs and how to transform these graphs in order to increase the privacy and/or accuracy properties. First, we propose three simple decentralized polling protocols that rely on the current state of social graphs. The two first protocols use synchronous and asynchronous models and verification procedures to detect the misbehaving users. The third protocol is an asynchronous one that does not require any verification procedures and contains a method for efficiently broadcasting message under a family of social graphs satisfying what we call the “m-broadcasting” property. Second, we formalize the “adding friends” problem such that we can reuse the social graphs after some minimum structural modifications consisting in adding new friendship relations. We also devise algorithms for solving this problem in centralized and decentralized networks. We validate our solutions with some performance evaluations which show that our protocols are accurate, and inside the theoretical bounds
Chouha, Paul-Robert. "From Classical to Quantum Secret Sharing." Thèse, 2012. http://hdl.handle.net/1866/12389.
Full textIn this thesis, we will focus on a cryptographic primitive known as secret sharing. We will explore both the classical and quantum domains of such schemes culminating our study by presenting a new protocol for sharing a quantum secret using the minimal number of possible quantum shares i.e. one single quantum share per participant. We will start our study by presenting in the preliminary chapter, a brief mathematical survey of quantum information theory (QIT) which has for goal primarily to establish the notation used throughout the manuscript as well as presenting a précis of the mathematical properties of the Greenberger-Horne-Zeilinger (GHZ)-state, which is used thoroughly in cryptography and in communication games. But as we mentioned above, our main focus will be on cryptography. In chapter two, we will pay a close attention to classical and quantum error corrections codes (QECC) since they will become of extreme importance when we introduce quantum secret sharing schemes in the following chapter. In the first part of chapter three, we will focus on classical secret shearing, presenting a general framework for such a primitive all the while illustrating the abstract concepts with examples presented both for their historical and analytical relevance. This first part (chapters one and two) will pave the way for our exposition of the theory of Quantum Secret Sharing (QSS), which will be the focus of the second part of chapter three. We will present then the most general theorems and definitions known to date for the construction of such primitives putting emphasis on the special case of quantum threshold schemes. We will show how quantum error correction codes are related to QSS schemes and show how this relation leads to a very solid correspondence to the point that QECC’s are closer analogues to QSS schemes than are the classical secret sharing primitives. Finally, we will present one of the three results we have in A. Broadbent, P.-R. Chouha, A. Tapp (2009) in particular, a secure minimal quantum threshold protocol (the other two results deal with communication complexity and the classical simulation of the GHZ-state).
Books on the topic "Partage de Secret Homomorphe"
Agnès, Delage-Calvet, ed. Le partage du secret: Stratégies discursives, cultures du dévoilement et de l'occultation en Europe du Moyen Age à l'époque moderne. Paris: Colin, 2013.
Find full textVisual cryptography and secret image sharing. Boca Raton, FL: Taylor & Francis, 2011.
Find full textDarbord, Bernard, and Agnès Delage. Le partage du secret. Armand Colin, 2013. http://dx.doi.org/10.3917/arco.darb.2013.01.
Full textCimato, Stelvio, and Ching-Nung Yang. Visual Cryptography and Secret Image Sharing. Taylor & Francis Group, 2017.
Find full textCimato, Stelvio, and Ching-Nung Yang. Visual Cryptography and Secret Image Sharing. Taylor & Francis Group, 2011.
Find full textCimato, Stelvio, and Ching-Nung Yang. Visual Cryptography and Secret Image Sharing. Taylor & Francis Group, 2017.
Find full textCimato, Stelvio, and Ching-Nung Yang. Visual Cryptography and Secret Image Sharing. Taylor & Francis Group, 2017.
Find full textCimato, Stelvio, and Ching-Nung Yang. Visual Cryptography and Secret Image Sharing. Taylor & Francis Group, 2017.
Find full textBook chapters on the topic "Partage de Secret Homomorphe"
Darbord, Bernard, and Agnès Delage. "Présentation." In Le partage du secret, 7. Armand Colin, 2013. http://dx.doi.org/10.3917/arco.darb.2013.01.0007.
Full textDarbord, Bernard, and Agnès Delage. "Présentation." In Le partage du secret, 13. Armand Colin, 2013. http://dx.doi.org/10.3917/arco.darb.2013.01.0013.
Full textAbbes, Makram. "1 - Le secret dans les Miroirs des princes andalous (Xe-XVe siècles)." In Le partage du secret, 17. Armand Colin, 2013. http://dx.doi.org/10.3917/arco.darb.2013.01.0017.
Full textFabre, Gilbert. "2 - « Conseiller » et « détenir un secret » en espagnol médiéval." In Le partage du secret, 44. Armand Colin, 2013. http://dx.doi.org/10.3917/arco.darb.2013.01.0044.
Full textHeusch, Carlos. "3 - Écrire dans le secret : la tradition médiévale du savoir caché." In Le partage du secret, 78. Armand Colin, 2013. http://dx.doi.org/10.3917/arco.darb.2013.01.0078.
Full textBiaggini, Olivier. "4 - L’évidence et le secret : sur l’exemple 32 duConde Lucanor." In Le partage du secret, 97. Armand Colin, 2013. http://dx.doi.org/10.3917/arco.darb.2013.01.0097.
Full textDarbord, Bernard. "5 - Le secret dans les contes etexempladu Moyen Âge espagnol." In Le partage du secret, 123. Armand Colin, 2013. http://dx.doi.org/10.3917/arco.darb.2013.01.0123.
Full textParedes, Juan. "6 - Les voix du secret dans le conte médiéval. Vers une poétique du silence." In Le partage du secret, 142. Armand Colin, 2013. http://dx.doi.org/10.3917/arco.darb.2013.01.0142.
Full textJabbour, Jawdath. "7 - D’un secret qui ne saurait se tenir." In Le partage du secret, 155. Armand Colin, 2013. http://dx.doi.org/10.3917/arco.darb.2013.01.0155.
Full textDarbord, Bernard, and Agnès Delage. "Présentation." In Le partage du secret, 175. Armand Colin, 2013. http://dx.doi.org/10.3917/arco.darb.2013.01.0175.
Full text