Filters








35,609 Hits in 7.8 sec

An Automated Group Key Authentication System Using Secret Image Sharing Scheme [article]

Dipak Kumar Kole, Subhadip Basu
2014 arXiv   pre-print
Using secret image sharing scheme, this group key image shares are distributed among all the participating group members in the open network.  ...  Some or all the secret shares may be merged to reconstruct the group key image at CAS.  ...  A secret image sharing scheme, is a method for sharing a secret image among a set of participants.  ... 
arXiv:1410.4019v1 fatcat:5rdtanhubfgzbk7cwzsvebggne

(n, n+1) Visual Secret Sharing Scheme Based on Local Binary Pattern Operator

Wen-Yin ZHANG, Rui-Xia XIE, Chao-Yang ZHANG
2017 DEStech Transactions on Computer Science and Engineering  
A novel (n,n+1) Visual Secret Sharing (VSS) Scheme based on Local Binary Pattern (LBP) operators was presented in this paper.  ...  The proposed schemes without adopting Boolean operations make full use of the local contrast features of LBP operators to conceal secret image data into different image shares, which can then be used to  ...  Acknowledgement This research was financially supported by the National Science Foundation of Shandong Province (ID: ZR2011FL014), National Scholarship Fund of China (ID:201308370009).  ... 
doi:10.12783/dtcse/aice-ncs2016/5695 fatcat:gaezltvtureavfs3fq4u6ha6xq

Multimedia traffic security architecture for the internet of things

Liang Zhou, Han-Chieh Chao
2011 IEEE Network  
We present the multimedia traffic classification and analysis in the context of the IoT.  ...  for media-aware traffic security • Designing and evaluating the proposed security-critical traffic management scheme The rest of this article is organized as follows.  ...  Compared to traditional visual secret sharing solutions, the proposed scheme reduces the complexity of multimedia computations and decreases the size of the shares.  ... 
doi:10.1109/mnet.2011.5772059 fatcat:tdmcnwqz7zfp3ovqtjqktsyilq

Towards an Efficient Privacy-Preserving Decision Tree Evaluation Service in the Internet of Things

Lin Liu, Jinshu Su, Baokang Zhao, Qiong Wang, Jinrong Chen, Yuchuan Luo
2020 Symmetry  
In this scheme, the cloud learns nothing of the query data and classification results, and the client has no idea of the tree. Moreover, this scheme also supports offline users.  ...  To design such a scheme, a new secure comparison protocol based on additive secret sharing technology is proposed in a two-cloud model.  ...  Conflicts of Interest: The authors declare no conflict of interest regarding the publication of this manuscript.  ... 
doi:10.3390/sym12010103 fatcat:bftdttmw5rdhxmyfvkzptj6com

Secure Routing Scheme in MANETs using Secret Key Sharing

A. Amuthan, B.Aravind Baradwaj
2011 International Journal of Computer Applications  
The proposed scheme is based on Shamir secret sharing scheme with encrypted transmission of keys.  ...  Secure Routing Keywords Multicast, Secure Routing, Tree based protocols, Shamir secret sharing scheme, RSA, Mobile Ad-hoc NETworks.  ...  The idea of secret sharing is to generate a secret and send it to the participating nodes in the network.  ... 
doi:10.5120/2545-3487 fatcat:ssormimedre4dbuywgvki6etji

A Survey Paper on Key Aggregate Cryptosystem: A Key Assignment Scheme for Scalable Data Sharing Over Cloud Storage

2015 International Journal of Science and Research (IJSR)  
The storing of these ciphertexts and the decryption keys is one of the major issues.  ...  Providing security to a single file or a set of files is an important factor. With the introduction of encryption and decryption schemes, the storing, sharing and securing of data became rampant.  ...  One can see that this approach is not flexible when the classification share more complex and she wants to share different sets of files to different people [4] .  ... 
doi:10.21275/v4i11.nov151729 fatcat:r3ahn3mmxnhe3dsqooykryx4na

Applying secret sharing schemes to service reputation

A.S. Namin, Ruizhong Wei, Weiming Shen, H. Ghenniwa
2005 Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005.  
We propose to apply Threshold Schemes under the context of service reputation towards providing an unconditionally secure "reputation" credits and systems for services and their providers.  ...  As a result, any service requester will be able to rely on valuable reputation information and chooses the most reliable services with confidence.  ...  We consider both models either giving more shares to some requesters or giving shares based on classification of requesters through this paper.  ... 
doi:10.1109/cscwd.2005.194269 dblp:conf/cscwd/NaminWSG05 fatcat:tr3f7riz7bh23dwywsvx4ml7qy

Private Evaluation of Decision Trees using Sublinear Cost

Anselme Tueno, Florian Kerschbaum, Stefan Katzenbeisser
2019 Proceedings on Privacy Enhancing Technologies  
Each comparison is performed using a small garbled circuit, which output secret-shares of the index of the next node.  ...  The main idea of our novel solution is to represent the tree as an array. Then we execute only d – the depth of the tree – comparisons.  ...  This work has received funding from the European Union's Horizon 2020 Research and Innovation Programme under grant agreement No. 644579 of ESCUDO-CLOUD project.  ... 
doi:10.2478/popets-2019-0015 dblp:journals/popets/TuenoKK19 fatcat:3cbbw5i3ijarzce5obthny2jda

A Context-Aware Access Control Model for Pervasive Environments

Sumayah Al-Rwais, Jalal Al-Muhtadi
2009 2009 Third International Conference on Network and System Security  
The idea here is that not all specified context conditions must be captured, k captured contexts are enough. The management of access decisions is distributed among the different contexts.  ...  In CAAC-TC, multiple encryption layers can be specified where each layer is an encryption scheme of either n-out-of-n or k-out-ofn. Multiple layers simulate the use of an 'AND' operator.  ...  Threshold schemes are based on the idea of sharing a secret between different entities.  ... 
doi:10.1109/nss.2009.66 dblp:conf/nss/Al-RwaisA09 fatcat:7hmckcmfafaxjdm5lxr2y6k74e

Page 6709 of Mathematical Reviews Vol. , Issue 2001I [page]

2001 Mathematical Reviews  
I show that any mixed state quantum secret scheme can be derived by discarding a share from a pure state scheme, and that the size of each share in a quantum secret sharing scheme must be at least as large  ...  Summary: “I present a variety of results on the theory of quantum secret sharing.  ... 

A Context-aware Access Control Model for Pervasive Environments

Sumayah Al-Rwais, Jalal Al-Muhtadi
2010 IETE Technical Review  
The idea here is that not all specified context conditions must be captured, k captured contexts are enough. The management of access decisions is distributed among the different contexts.  ...  In CAAC-TC, multiple encryption layers can be specified where each layer is an encryption scheme of either n-out-of-n or k-out-ofn. Multiple layers simulate the use of an 'AND' operator.  ...  Threshold schemes are based on the idea of sharing a secret between different entities.  ... 
doi:10.4103/0256-4602.63847 fatcat:yelasakhyjby3nzsslarmzxhn4

Private Speech Classification with Secure Multiparty Computation [article]

Kyle Bittner, Martine De Cock, Rafael Dowsley
2021 arXiv   pre-print
In both cases there is no leakage of information, and we achieve classification accuracies that are the same as when computations are done on unencrypted data.  ...  Our approach, which is based on Secure Multiparty Computation, allows to classify a speech signal of one party (Alice) with a deep neural network of another party (Bob) without Bob ever seeing Alice's  ...  Acknowledgements The authors would like to thank Marcel Keller for making the MP-SPDZ framework available, and for his assistance in the use of the framework.  ... 
arXiv:2007.00253v2 fatcat:rajekufeufbfjeiettm3gsscre

A Review Report on Time Domain-Attribute-based Access Control for Video substance distribution: A Cryptographic Approach

Kumar Gaurav, Sanjeev Gupta
2017 International Journal of Computer Applications  
Visual cryptography encodes a secret binary image (SI) keen on share of unsystematic binary sample.  ...  Visual cryptography (VC) could be a secret sharing method of decay a secret picture into n transparencies, and consequently the stack of any t out of n transparencies disclose the key content.  ...  [6] "Secret Image Sharing Scheme with Threshold Changeable Capability" In secret image sharing schemes, the edge would possibly got to be adjusted simply in case of changes at intervals the safety policy  ... 
doi:10.5120/ijca2017915857 fatcat:xqw2bnnqtvgojjxrvtxkmigogu

An Image Secret Sharing Method

Li Bai, Saroj Biswas, Albert Ortiz, Don Dalessandro
2006 2006 9th International Conference on Information Fusion  
This paper presents an image secret sharing method which essentially incorporates two k-out-of-n secret sharing schemes: i) Shamir's secret sharing scheme and ii) matrix projection secret sharing scheme  ...  In comparison with other image secret sharing methods, this approach's advantages are its large compression rate on the size of the image shares, its strong protection of the secret image and its ability  ...  Shamir's Secret Sharing Scheme Shamir [16] developed the idea of a (k, n) thresholdbased secret sharing technique (k ≤ n).  ... 
doi:10.1109/icif.2006.301805 dblp:conf/fusion/BaiBOD06 fatcat:orud6imo3ffhhiddtygnfo2ezm

Some interesting constructions for secret sharing schemes

Diane M. Donovan
1994 The Australasian Journal of Combinatorics  
It includes a discussion of the mathematical structures which have been used to model secret sharing schemes, the establishment of secret sharing schemes which do not require the existence of a trusted  ...  This article documents some of the known constructions for secret sharing schemes.  ...  Acknowledgement This research was supported by the ARC, the QUT Meritorious Grants Projects Scheme, ATERB and carried out while the author was a Postdoctoral Fellow at the Queensland University of Technology  ... 
dblp:journals/ajc/Donovan94 fatcat:w47xuwuqircclccvsg6j4vdake
« Previous Showing results 1 — 15 out of 35,609 results