[PDF][PDF] Non-malleable cryptography
The notion of non-malleable cryptography, an extension of semantically secure
cryptography, is defined. Informally, the additional requirement is that given the ciphertext it …
cryptography, is defined. Informally, the additional requirement is that given the ciphertext it …
Secret-sharing schemes: A survey
A Beimel - International conference on coding and cryptology, 2011 - Springer
A secret-sharing scheme is a method by which a dealer distributes shares to parties such
that only authorized subsets of parties can reconstruct the secret. Secret-sharing schemes …
that only authorized subsets of parties can reconstruct the secret. Secret-sharing schemes …
Byzantine quorum systems
Quorum systems are well-known tools for ensuring the consistency and availability of
replicated data despite the benign failure of data repositories. In this paper we consider the …
replicated data despite the benign failure of data repositories. In this paper we consider the …
Distributed pseudo-random functions and KDCs
This work describes schemes for distributing between n servers the evaluation of a function f
which is an approximation to a random function, such that only authorized subsets of servers …
which is an approximation to a random function, such that only authorized subsets of servers …
Ad hoc mobility management with uniform quorum systems
A distributed mobility management scheme using a class of uniform quorum systems (UQS)
is proposed for ad hoc networks. In the proposed scheme, location databases are stored in …
is proposed for ad hoc networks. In the proposed scheme, location databases are stored in …
Magic functions: In memoriam: Bernard m. dwork 1923--1998
We prove that three apparently unrelated fundamental problems in distributed computing,
cryptography, and complexity theory, are essentially the same problem. These three …
cryptography, and complexity theory, are essentially the same problem. These three …
Byzantine quorum systems
Quorum Bystems are well-known tools for ensuring the consistency and availability of
replicated data despite the benign failure of data repositones. In this paper we consider the …
replicated data despite the benign failure of data repositones. In this paper we consider the …
Secret image sharing scheme with lossless recovery and high efficiency
S Luo, Y Liu, X Yan, Y Yu - Signal Processing, 2023 - Elsevier
As a well-known secret image sharing scheme, Thien-and-Lin's scheme generates shadow
images of reduced size, which is beneficial for storage, transmission, and processing …
images of reduced size, which is beneficial for storage, transmission, and processing …
An enhanced security framework for secured data storage and communications in cloud using ECC, access control and LDSA
In this paper, we propose an enhanced security framework for securing the cloud users data
in the cloud environment. This new security framework consists of access control …
in the cloud environment. This new security framework consists of access control …
Security in cyber-enabled design and manufacturing: A survey
SC Chaduvula, A Dachowicz… - Journal of …, 2018 - asmedigitalcollection.asme.org
Developments in digital technology and manufacturing processes have expanded the
horizon of designer innovation in creating products. In addition to this, real-time collaborative …
horizon of designer innovation in creating products. In addition to this, real-time collaborative …