Добірка наукової літератури з теми "Leakage resilient secret sharing"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Leakage resilient secret sharing".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Leakage resilient secret sharing"
Dai, ShuGuang, JinFeng Wei, and FangGuo Zhang. "Memory leakage-resilient secret sharing schemes." Science China Information Sciences 58, no. 11 (September 23, 2015): 1–9. http://dx.doi.org/10.1007/s11432-015-5385-8.
Повний текст джерелаLi, Ping, Shengjun Li, Hongyang Yan, Lishan Ke, Teng Huang, and Alzubair Hassan. "A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme." Complexity 2020 (March 13, 2020): 1–13. http://dx.doi.org/10.1155/2020/1784276.
Повний текст джерелаLabao, Alfonso, and Henry Adorna. "Cryptographic Rational Secret Sharing Schemes over General Networks." Cryptography 6, no. 4 (October 1, 2022): 50. http://dx.doi.org/10.3390/cryptography6040050.
Повний текст джерелаMaitra, Arpita, and Goutam Paul. "A Resilient Quantum Secret Sharing Scheme." International Journal of Theoretical Physics 54, no. 2 (June 26, 2014): 398–408. http://dx.doi.org/10.1007/s10773-014-2233-3.
Повний текст джерелаZhou, Yanwei, Bo Yang, Tao Wang, Zhe Xia, and Hongxia Hou. "Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings." Computer Journal 63, no. 4 (November 13, 2019): 508–24. http://dx.doi.org/10.1093/comjnl/bxz085.
Повний текст джерелаGuo, Yuyan, Jiguo Li, Mingming Jiang, Lei Yu, and Shimin Wei. "Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model." Security and Communication Networks 2020 (June 28, 2020): 1–11. http://dx.doi.org/10.1155/2020/1492681.
Повний текст джерелаHuang, Jianye, Qiong Huang, and Chunhua Pan. "A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting." International Journal of Foundations of Computer Science 28, no. 06 (September 2017): 761–80. http://dx.doi.org/10.1142/s0129054117400172.
Повний текст джерелаTang, Fei, Hongda Li, Qihua Niu, and Bei Liang. "Secure Mobile Agent from Leakage-Resilient Proxy Signatures." Mobile Information Systems 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/901418.
Повний текст джерелаZhang, Yinghui, Pengzhen Lang, Dong Zheng, Menglei Yang, and Rui Guo. "A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience." Security and Communication Networks 2018 (June 24, 2018): 1–13. http://dx.doi.org/10.1155/2018/7202598.
Повний текст джерелаTseng, Yuh–Min, Jui-Di Wu, Sen-Shan Huang, and Tung-Tso Tsai. "Leakage-Resilient Outsourced Revocable Certificateless Signature with a Cloud Revocation Server." Information Technology And Control 49, no. 4 (December 19, 2020): 464–81. http://dx.doi.org/10.5755/j01.itc.49.4.25927.
Повний текст джерелаДисертації з теми "Leakage resilient secret sharing"
Chen, Guan-Wei, and 陳冠瑋. "Near Optimal Secret Sharing and Defense Resource Allocation Plans for QoS Constrained Information Leakage Minimization." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/76650438020223405520.
Повний текст джерела國立臺灣大學
資訊管理學研究所
97
With the rapid prosperity of information systems and the Internet, most enterprises obtain competitive advantage by means of these information technologies. Hence, each enterprise uses the electronic equipment to store the sensitive information about core competence of the business. However, if the business secrets are leaked by opponents, it would lead to lose the competence and ruin their reputation for victims. For this reason, individuals or enterprises must protect the secrets from information leakage and ensure the availability for each legitimate user. As a result of the more criminal problems as time goes by, it becomes one of the important issues to develop effective defense strategies against information theft nowadays. In this thesis, we consider the network planning in the realm of the information security. The attack-defense scenario is formulated as the min-max mathematical model. In the inner problem, the attacker must allocate his/her limited attack budget to steal the sensitive information in order to cause maximal damage. In addition, the attacker could not reveal the secret unless he/she collects the enough number of shares and the corresponding decrypted key. On the other hand, in the outer problem, the network operator must construct the network topology and take account of the concept of defense-in-depth to design the most robust network. Furthermore, the combination of the secret sharing scheme and defense resource allocation strategy is applied for the sake of the confidentiality and availability. However, the attacker’s behavior is different from traditional attacks that he/she causes damage as soon as compromising nodes. Because of the consideration of the link malfunction, the network operator should not only guarantee the reliability of the network transmission but also satisfy the Quality-of-Service for legitimate users. The Lagrangean Relaxation-based algorithm and the subgradient-based algorithm are proposed to solve the two layer mathematical problem. Beside, we further formulate the independent single layer model for the initial network deployment problem and define the “Discrete Degree” metric to represent the impact of the attacker. The Simulated Annealing-based algorithm is applied to handle this problem. Finally, we evaluate the efficiency and effectiveness of the proposed algorithms by computational experiments.
Chen, Ding-Jie, and 陳鼎介. "An RST-Resilient Image Intellectual Property Protection Scheme Based on Fourier-Mellin Transform and Secret Sharing." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/13834369141719003666.
Повний текст джерела大同大學
資訊工程學系(所)
94
In many watermarking systems, the main principle to retrieve the watermark is based on the knowledge of the positions for embedding the watermark. However, the geometric distortions rearrange the watermark embedding positions, and this often results in the failure of the watermark retrieval. In this thesis, the proposed scheme aims at resisting the rotation, scaling, and translation of the geometric distortions. The scheme contains a private share generation phase and a secret image retrieval phase. In the private share generation phase, the scheme employs the RST-invariant domain to obtain the feature share of the host image, and then generate the corresponding private share based on the secret sharing scheme for authentication. In the secret image retrieval phase, the feature share of the suspect image is retrieved from the RST-invariant domain, and then combined with the private share to regain the secret image for copyright authentication. The experimental results show that the scheme can withstand several attacks such as averaging, contrast adjustment, Gaussian blurring, JPEG compression, median filtering, Brightness-adjustment, sharpening, uniform noise adding, variance noise adding, slight affine transformation, slight pinching, slight punching, rescaling, lines removing, rotating, rotating with cropping, rotating with scaling, equalization, and print-and-scan.
Частини книг з теми "Leakage resilient secret sharing"
Srinivasan, Akshayaram, and Prashant Nalini Vasudevan. "Leakage Resilient Secret Sharing and Applications." In Advances in Cryptology – CRYPTO 2019, 480–509. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-26951-7_17.
Повний текст джерелаNielsen, Jesper Buus, and Mark Simkin. "Lower Bounds for Leakage-Resilient Secret Sharing." In Advances in Cryptology – EUROCRYPT 2020, 556–77. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45721-1_20.
Повний текст джерелаDutta, Sabyasachi, and Reihaneh Safavi-Naini. "Leakage Resilient Cheating Detectable Secret Sharing Schemes." In Information Security and Privacy, 3–23. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90567-5_1.
Повний текст джерелаMaji, Hemanta K., Anat Paskin-Cherniavsky, Tom Suad, and Mingyuan Wang. "Constructing Locally Leakage-Resilient Linear Secret-Sharing Schemes." In Advances in Cryptology – CRYPTO 2021, 779–808. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-84252-9_26.
Повний текст джерелаMaji, Hemanta K., Hai H. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang, Xiuyu Ye, and Albert Yu. "Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family." In Theory of Cryptography, 355–83. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-22318-1_13.
Повний текст джерелаChandran, Nishanth, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, and Sruthi Sekar. "Short Leakage Resilient and Non-malleable Secret Sharing Schemes." In Advances in Cryptology – CRYPTO 2022, 178–207. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-15802-5_7.
Повний текст джерелаLi, Ping, Jin Li, and Alzubair Hassan. "Group Identification via Non-threshold Leakage-Resilient Secret Sharing Scheme." In Cyberspace Safety and Security, 234–41. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37352-8_20.
Повний текст джерелаChandran, Nishanth, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, and Sruthi Sekar. "Adaptive Extractors and Their Application to Leakage Resilient Secret Sharing." In Advances in Cryptology – CRYPTO 2021, 595–624. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-84252-9_20.
Повний текст джерелаXiong, Hao, Cong Zhang, Tsz Hon Yuen, Echo P. Zhang, Siu Ming Yiu, and Sihan Qing. "Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model." In Information and Communications Security, 119–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34129-8_11.
Повний текст джерелаMaji, Hemanta K., Hai H. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, and Mingyuan Wang. "Leakage-Resilience of the Shamir Secret-Sharing Scheme Against Physical-Bit Leakages." In Lecture Notes in Computer Science, 344–74. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77886-6_12.
Повний текст джерелаТези доповідей конференцій з теми "Leakage resilient secret sharing"
Kumar, Ashutosh, Raghu Meka, and Amit Sahai. "Leakage-Resilient Secret Sharing Against Colluding Parties." In 2019 IEEE 60th Annual Symposium on Foundations of Computer Science (FOCS). IEEE, 2019. http://dx.doi.org/10.1109/focs.2019.00045.
Повний текст джерелаAdams, Donald Q., Hemanta K. Maji, Hai H. Nguyen, Minh L. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, and Mingyuan Wang. "Lower Bounds for Leakage-Resilient Secret-Sharing Schemes against Probing Attacks." In 2021 IEEE International Symposium on Information Theory (ISIT). IEEE, 2021. http://dx.doi.org/10.1109/isit45174.2021.9518230.
Повний текст джерелаMaji, Hemanta K., Hai H. Nguyen, Anat Paskin-Cherniavsky, and Mingyuan Wang. "Improved Bound on the Local Leakage-resilience of Shamir’s Secret Sharing." In 2022 IEEE International Symposium on Information Theory (ISIT). IEEE, 2022. http://dx.doi.org/10.1109/isit50566.2022.9834695.
Повний текст джерелаDziembowski, Stefan, and Krzysztof Pietrzak. "Intrusion-Resilient Secret Sharing." In 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07). IEEE, 2007. http://dx.doi.org/10.1109/focs.2007.4389495.
Повний текст джерелаDziembowski, Stefan, and Krzysztof Pietrzak. "Intrusion-Resilient Secret Sharing." In 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07). IEEE, 2007. http://dx.doi.org/10.1109/focs.2007.63.
Повний текст джерелаUkwandu, Elochukwu, William J. Buchanan, Lu Fan, Gordon Russell, and Owen Lo. "RESCUE: Resilient Secret Sharing Cloud-Based Architecture." In 2015 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2015. http://dx.doi.org/10.1109/trustcom.2015.459.
Повний текст джерелаJuarez-Sandoval, Oswaldo, Atoany Fierro-Radilla, Angelina Espejel-Trujillo, Mariko Nakano-Miyatake, and Hector Perez-Meana. "Cropping and noise resilient steganography algorithm using secret image sharing." In Sixth International Conference on Graphic and Image Processing (ICGIP 2014), edited by Yulin Wang, Xudong Jiang, and David Zhang. SPIE, 2015. http://dx.doi.org/10.1117/12.2179745.
Повний текст джерелаLiu, Shenchuan, Masaaki Fujiyoshi, and Hitoshi Kiya. "A leakage suppressed two-level security visual secret sharing scheme." In 2011 International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS 2011). IEEE, 2011. http://dx.doi.org/10.1109/ispacs.2011.6146169.
Повний текст джерелаAlmeida, Jose Bacelar, Manuel Barbosa, Gilles Barthe, Hugo Pacheco, Vitor Pereira, and Bernardo Portela. "Enforcing Ideal-World Leakage Bounds in Real-World Secret Sharing MPC Frameworks." In 2018 IEEE 31st Computer Security Foundations Symposium (CSF). IEEE, 2018. http://dx.doi.org/10.1109/csf.2018.00017.
Повний текст джерелаHsieh, Shang-Lin, Ding-Jie Chen, Bin-Yuan Huang, and I.-Ju Tsai. "An RST-resilient image copyright protection scheme based on the invariant domain and image secret sharing." In 2008 IEEE International Conference on Systems, Man and Cybernetics (SMC). IEEE, 2008. http://dx.doi.org/10.1109/icsmc.2008.4811422.
Повний текст джерела