[PDF][PDF] Non-malleable cryptography

D Dolev, C Dwork, M Naor - Proceedings of the twenty-third annual ACM …, 1991 - dl.acm.org
The notion of non-malleable cryptography, an extension of semantically secure
cryptography, is defined. Informally, the additional requirement is that given the ciphertext it …

Secret-sharing schemes: A survey

A Beimel - International conference on coding and cryptology, 2011 - Springer
A secret-sharing scheme is a method by which a dealer distributes shares to parties such
that only authorized subsets of parties can reconstruct the secret. Secret-sharing schemes …

Byzantine quorum systems

D Malkhi, M Reiter - Distributed computing, 1998 - Springer
Quorum systems are well-known tools for ensuring the consistency and availability of
replicated data despite the benign failure of data repositories. In this paper we consider the …

Distributed pseudo-random functions and KDCs

M Naor, B Pinkas, O Reingold - International conference on the theory and …, 1999 - Springer
This work describes schemes for distributing between n servers the evaluation of a function f
which is an approximation to a random function, such that only authorized subsets of servers …

Ad hoc mobility management with uniform quorum systems

ZJ Haas, B Liang - IEEE/ACM Transactions on networking, 1999 - ieeexplore.ieee.org
A distributed mobility management scheme using a class of uniform quorum systems (UQS)
is proposed for ad hoc networks. In the proposed scheme, location databases are stored in …

Magic functions: In memoriam: Bernard m. dwork 1923--1998

C Dwork, M Naor, O Reingold… - Journal of the ACM (JACM), 2003 - dl.acm.org
We prove that three apparently unrelated fundamental problems in distributed computing,
cryptography, and complexity theory, are essentially the same problem. These three …

Byzantine quorum systems

D Malkhi, M Reiter - Proceedings of the twenty-ninth annual ACM …, 1997 - dl.acm.org
Quorum Bystems are well-known tools for ensuring the consistency and availability of
replicated data despite the benign failure of data repositones. In this paper we consider the …

Secret image sharing scheme with lossless recovery and high efficiency

S Luo, Y Liu, X Yan, Y Yu - Signal Processing, 2023 - Elsevier
As a well-known secret image sharing scheme, Thien-and-Lin's scheme generates shadow
images of reduced size, which is beneficial for storage, transmission, and processing …

An enhanced security framework for secured data storage and communications in cloud using ECC, access control and LDSA

B Prabhu Kavin, S Ganapathy, U Kanimozhi… - Wireless Personal …, 2020 - Springer
In this paper, we propose an enhanced security framework for securing the cloud users data
in the cloud environment. This new security framework consists of access control …

Security in cyber-enabled design and manufacturing: A survey

SC Chaduvula, A Dachowicz… - Journal of …, 2018 - asmedigitalcollection.asme.org
Developments in digital technology and manufacturing processes have expanded the
horizon of designer innovation in creating products. In addition to this, real-time collaborative …