Filters








196,312 Hits in 7.6 sec

S3DCE: Secure Storing and Sharing of Data in Cloud Environment using user Phrase

2020 International Journal of Engineering and Advanced Technology  
In this process of sharing, what if the key managers compromises with intruders and reveal the information of the user's key that is used for encryption.  ...  Distributed Cloud Environment (DCE) focuses mainly on securing the data and safely shares it to the user. Data leakage may occur by the channel compromising or with the key managers.  ...  The existing system DaSCE uses number of key managers that the owner has to wait to get back the key from all the key managers to encrypt the secret key and depends on the Shamir's secret sharing scheme  ... 
doi:10.35940/ijeat.d7303.049420 fatcat:zl35ukthfre3zp5lkcdrczgd5e

Secret Sharing Member Expansion Protocol Based on ECC

Feng Wang, Yujie Wu, Daofeng Li
2015 Open Cybernetics and Systemics Journal  
The protocols for member expansion in secret sharing schemes are very useful for key management in dynamic topology networks.  ...  This paper examines fifteen most recent patens that were awarded in the area of secret sharing.  ...  Patent 20,130,022,235 titled "Interactive secret sharing" [19] proposed an Interactive secret sharing that includes receiving video data from a source and interpreting the video data to track an observed  ... 
doi:10.2174/1874110x01408010248 fatcat:hxrf6vgu5fcxlpb27nzwf3xm6m

A STUDY ON THE EXISTING THRESHOLD CRYPTOGRAPHY TECHNIQUES

Prabha Elizabeth Varghese, Department Of Computer Science School of Engineering, CUSAT Kerala, India
2020 International Journal of Advanced Research in Computer Science  
Threshold cryptography in simple words is the art of splitting a secret into many bits. The secret can be recreated only by possessing more than a threshold number of bits of the secret.  ...  In a traditional secret sharing scheme, the secret is distributed amongst a group of participants, Each participant is allocated a share of the secret.  ...  Feldman [3] introduced the concept of non-interactive VSS where a share proves its own validity.  ... 
doi:10.26483/ijarcs.v11i5.6659 fatcat:fpzqcdilmzd73afwyb32frymku

An Efficient Elliptic Curve based Key Management Scheme for Distributed Sensor Networks

Porkodi Chinniah, Sangavai Krishnamoorthi
2019 European Journal of Engineering Research and Science  
Key distribution among the nodes and interactive as well as non interactive protocols for agreement of common secret key for message transmission between two nodes are discussed.  ...  In this work, a key management scheme is developed for distributed sensor networks based on elliptic curve cryptography over prime field.  ...  Nodes Ni and Nj share the secret keys in k(i) ∩ k(j) for which EK(i)Pm ∩ EK(j)Pm ≠{ }. This shared secret key set need not be singleton.  ... 
doi:10.24018/ejers.2019.4.6.1316 fatcat:2eroixgrg5brbmryfakfikivky

Secret interest groups (SIGs) in social networks with an implementation on Facebook

Alessandro Sorniotti, Refik Molva
2010 Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10  
In this paper we present the first framework that allows the creation of Secret Interest Groups (SIGs) in Online Social Networks; SIGs are self managed groups formed outside of the social network, around  ...  secret, sensitive or private topics.  ...  First, we use mechanisms for Secret Sharing and Secret Redistributions to allow SIG managers to share a secret and perform joint computations.  ... 
doi:10.1145/1774088.1774219 dblp:conf/sac/SorniottiM10 fatcat:xlzw4jffvbdt3j45vggjb3g55i

Dynamic Threshold Cryptosystem without Group Manager

Andreas Noack, Stefan Spitz
2009 Network Protocols and Algorithms  
Without a group manager or a trusted third party even more flexible scenarios can be realized. Network Protocols and Algorithms  ...  To prevent secret share manipulation, verifiable secret sharing (VSS) techniques can be used to proof the shares' authenticity [9] .  ...  now in possession of , , , and a secret share of . The secret share is the function evaluation of ∑ at position (homomorphism property). valid and fully functional secret share of the group .  ... 
doi:10.5296/npa.v1i1.161 fatcat:54ynpm4gunc7rdilizuzkc3tse

Distributed Secret Key Management Based on ECC for Ad-hoc Network

Yi-xuan WU, Hua-wei CHEN, Lei WANG
2017 DEStech Transactions on Computer Science and Engineering  
Third the secret share generation process for new node non-interactive, furthermore secret share update process is also non-interactive.  ...  There are several advantages in our scheme comparing with traditional distributed secret key management key: First we transfer the secret share generation process from initiator to nodes which belong to  ...  In our scheme, the generation of new node's secret share is non-interactive which means There is no secret key information leak during transmission.  ... 
doi:10.12783/dtcse/cnsce2017/8889 fatcat:fff6twtto5g5bm3m3ignnxclj4

Mobile Agents: Preserving Privacy and Anonymity [chapter]

Aneta Zwierko, Zbigniew Kotulski
2005 Lecture Notes in Computer Science  
The proposed schemes are based on different cryptographic primitives: a secret-sharing scheme and a zerokonwledge proof.  ...  In our proposal the Asmuth and Bloom secure secret sharing scheme ( [4] ) is used.  ...  He computes the secret (denoted as k): k ≡ s (mod p 0 ) and shares: s i ≡ s (mod p i ). The shares are distributed to participants via secure channel.  ... 
doi:10.1007/11558637_25 fatcat:dnuompk3gbcbfiqrlqh3daigl4

Dynamic, non-interactive key management for the bundle protocol

William L. Van Besien
2010 Proceedings of the 5th ACM workshop on Challenged networks - CHANTS '10  
This paper proposes a dynamic, and non-interactive scheme to facilitate secure communication in infrastructureless networks, supporting various levels of trust.  ...  Specifically, the solution presented in this paper provides a key management solution to opportunistic overlay networks using the Bundle Protocol. General Terms Security  ...  For two hosts, A and B, to non-interactively establish a shared secret, k AB , then A calculates kAB = e(SA, B).  ... 
doi:10.1145/1859934.1859951 dblp:conf/mobicom/Besien10 fatcat:y2izsfpg5fgmlc4ahrweyxu7y4

Publicly Verifiable Secret Sharing Using Non-Abelian Groups [article]

Delaram Kahrobaei, Elizabeth Vidaurre
2014 arXiv   pre-print
In his paper Stadler develops techniques for improving the security of existing secret sharing protocols by allowing to check whether the secret shares given out by the dealer are valid.  ...  In particular, the secret sharing is executed over abelian groups. In this paper we develop similar methods over non-abelian groups.  ...  The following describes a Shamir's secret sharing scheme with an additional non-interactive VSS and PVSS protocol.  ... 
arXiv:1403.3661v3 fatcat:ue4bcxk3e5bhvp2x2m34xy5dsa

Integrity of mobile agents: a new approach

Aneta Zwierko, Zbigniew Kotulski
2007 International Journal of Network Security  
The proposal is based on a zero-knowledge proof system and a secure secret sharing scheme, two powerful cryptographic primitives.  ...  Then, the manager (playing the role of a dealer in the secret sharing scheme) instead of selecting at random an integer s, such that After computing s, the manager creates appropriate shares: s i ≡ s (  ...  Secure Secret Sharing Scheme A (t, n) threshold secret sharing scheme [2, 15] distributes a secret among n participants in such a way, that any t of them can recreate the secret, but any t − 1 or fewer  ... 
dblp:journals/ijnsec/ZwierkoK07 fatcat:7e5jgi5pzngo3ex3g4ai4d53gm

Practical Use of Secret Sharing for Enhancing Privacy in Clouds

Peter Čuřík, Roderik Ploszek, Pavol Zajac
2022 Electronics  
In the final part, we explore the ramifications of secret sharing on the security and management of IoT devices, especially home appliances.  ...  The topic of this contribution is the practical use of secret sharing schemes in securing private data. In the first part, we focus on the security model and the overview of the available solutions.  ...  The IoT user typically does not interact directly with the stored data and is not responsible for their management. 3. Management of IoT.  ... 
doi:10.3390/electronics11172758 fatcat:b7bfqsz2nbeu7kim32shqg5whe

A Survey on Key Management of Identity-based Schemes in Mobile Ad Hoc Networks

Kuo Zhao, Longhe Huang, Hongtu Li, Fangming Wu, Jianfeng Chu, Liang Hu
2013 Journal of Communications  
.  Index Terms-MANETs, identity-based cryptography, key management I.  ...  In mobile ad hoc networks (MANETs), the research on key management of identity-based scheme is attracting more and more attention.  ...  secret shares as the private keys.  ... 
doi:10.12720/jcm.8.11.768-779 fatcat:frkaotni2bfi7lcldt27oun2a4

Page 3144 of Mathematical Reviews Vol. , Issue 2003d [page]

2003 Mathematical Reviews  
A multi- secret sharing scheme can be trivially realized by realizing a secret sharing scheme for each of the secrets.  ...  A multi-secret sharing scheme is the natural extension of a secret sharing scheme to the case in which many secrets need to be shared, each with respect to possibly different subsets of qualified parties  ... 

Quantum-Key-Distribution (QKD) Networks Enabled by Software-Defined Networks (SDN)

Hua Wang, Yongli Zhao, Avishek Nag
2019 Applied Sciences  
Thus, QKD networks need an effective management plane to control and coordinate with the QKD resources.  ...  As a promising technology, software defined networking (SDN) can separate the control and management of QKD networks from the actual forwarding of the quantum keys.  ...  ., secret-key provisioning services and security management services.  ... 
doi:10.3390/app9102081 fatcat:iaxgrmny3bf3dhxjpijujjhmny
« Previous Showing results 1 — 15 out of 196,312 results