A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2011; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Tree Based Recursive Information Hiding Scheme
2010
2010 IEEE International Conference on Communications
This paper presents a k-out-of-n recursive information hiding scheme based on an n-ary tree data structure. ...
It may be used as a steganographic channel to transmit hidden information, which may be used for authentication and verification of shares and the reconstructed secret itself. Keywords. ...
A comparison can be made between the efficiency of conventional secret sharing schemes and tree based recursive information hiding schemes. ...
doi:10.1109/icc.2010.5502430
dblp:conf/icc/ParakhK10
fatcat:hf6svafxi5f2nozokzkttyta6q
Space efficient secret sharing for implicit data security
2011
Information Sciences
In other words, our technique can be looked upon as a new information dispersal scheme that provides near optimal space efficiency. ...
This paper presents a k-threshold computational secret sharing technique that distributes a secret S into shares of size jSj kÀ1 , where jSj denotes the secret size. ...
In order to achieve this we propose a new space efficient secret sharing scheme. ...
doi:10.1016/j.ins.2010.09.013
fatcat:y5k4pmslgvhrraqjdgq57pyshm
Consequence of Space Efficient Secret Sharing for Secure Multi-Path Data Delivery in WSN
2017
Indian Journal of Science and Technology
Methods/Analysis: In this paper, Space Efficient Secret Sharing (SESS) scheme is proposed for secured data delivery in the WSN. ...
The SESS scheme primarily uses recursive polynomial interpolation and its secret size is optimized as k zz -1 . ...
Parakh 6 had proposed a space efficient secret sharing scheme, which uses recursive hiding of secrets for enhancing the security level. ...
doi:10.17485/ijst/2017/v10i10/86080
fatcat:c275cz7fo5gbdbqgadbp3nikau
Poster
2011
Proceedings of the 18th ACM conference on Computer and communications security - CCS '11
Secure collaborative applications need such flexible attribute based systems for managing and distributing group keys. ...
Our scheme efficiently supports rekeying operations when the group changes due to joins or leaves of group members. ...
Acknowledgements The work reported in this paper has been partially supported by the NSF grant 0712846 "IPS: Security Services for Healthcare Applications," and the MURI award FA9550-08-1-0265 from the ...
doi:10.1145/2046707.2093502
fatcat:l3irkoepwbcsnjyk5t5ecjuhji
DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
2019
International Journal of Engineering
By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. ...
In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a novel authentication mechanism ...
In [16] , a new access structure as Blocked Linear Secret Sharing Scheme (BLSSS) is proposed for more scalability, but providing efficiency by managing partial blocks left for future works. ...
doi:10.5829/ije.2019.32.09c.09
fatcat:f5go5sayn5cnfaksa56m4e6ms4
A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing
2019
IEEE Access
Different to existing schemes, the leaves in different access trees with the same attribute share the same secret number, which is employed to encrypt the documents. ...
In CP-ABHE, we first construct a set of integrated access trees based on the documents' attribute sets. ...
[39] also propose a file sharing scheme in cloud computing based on ABE and the security and efficiency of the scheme are evaluated. Li et al. ...
doi:10.1109/access.2019.2905346
fatcat:ef76muqdkfdhbhtgrikaqdhc3m
Attribute-Based Blind Signature Scheme Based on Elliptic Curve Cryptography
2022
IEEE Access
The new scheme uses linear secret sharing scheme (LSSS) matrix technology that does not require recursive operation to achieve more flexible and fine-grained access control. ...
Our scheme is a key policy attribute-based signature (KP-ABS). ...
ACKNOWLEDGMENT The authors would like to thank the editors and reviewers for their recognition and hard work on this paper. ...
doi:10.1109/access.2022.3162231
fatcat:wwzgvt4cmbb33afeqcwycwrore
Efficient techniques for realizing geo-spatial access control
2007
Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07
The problem of key management for access control systems has been well-studied, and the literature contains several schemes for hierarchy-based and temporal-based access control. ...
Our main result is an efficient scheme with the following properties: (i) each user obtains a small constant number of secret keys that permit access to an arbitrary rectangular sub-grid, (ii) computation ...
It builds a tree for S rooted at v, using a recursive construction. ...
doi:10.1145/1229285.1229301
dblp:conf/ccs/AtallahBF07
fatcat:67zzos7w3zdubkj3e63owvje7i
Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data
2019
Security and Communication Networks
In this paper, a secret-sharing scheme is proposed to reduce the size of the blockchain transactions. ...
Meanwhile, the proposed scheme was more efficient and secure compared to other state-of-the-art schemes that aim to reduce blockchain storage for industrial big data. ...
Dehkordi and Mashhadi's scheme [19] focused on improving the efficiency of computations involved in share creation and secret reconstruction rather than space efficiency. ...
doi:10.1155/2019/9060756
fatcat:pstn4psq3jfdff4auurb6b5ogm
Efficient and Secure Ciphertext-Policy Attribute-Based Encryption Without Pairing for Cloud-Assisted Smart Grid
2020
IEEE Access
As a promising encryption method for supporting fine-grained access control, attribute-based encryption (ABE) is widely given attention by the academia and industry. ...
However, most existing schemes suffer from the efficiency problem limiting its deployment for the cloud-assisted smart grid, especially for resource-limited users. ...
ACKNOWLEDGMENT The authors would like to thank all anonymous reviewers for their suggestions and comments for improvement of this article. ...
doi:10.1109/access.2020.2976746
fatcat:czbdvmczbbgj5gz745sgzz3p5u
Anonymous Electronic Health Record Sharing Scheme Based on Decentralized Hierarchical Attribute-based encryption in Cloud Environment
2020
IEEE Access
ACKNOWLEDGMENT The authors wish to thank the anonymous referees for their patience in reading this manuscript and heir invaluable comments and suggestions. ...
[28] proposed a privacypreserving decentralized ABE scheme for secure sharing of PHR based on Lewko and Waters's scheme, in which an anonymous secret key issuing protocol is used to hide GID. ...
To sum up, an efficient and practical EHR sharing system must be distributed and should support anonymous key generation and save storage space.
A. ...
doi:10.1109/access.2020.3035468
fatcat:jaqp6injcbcr7jweoalegdq35i
Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines
[chapter]
2009
Lecture Notes in Computer Science
Existing techniques for memory authentication that are not based on trees are described and their performance/security trade-off is discussed. ...
After a description of the active attacks that threaten memory integrity, this paper surveys existing cryptographic techniques -namely integrity trees -allowing for memory authentication. ...
Therefore, a scheme must be designed to manage tree roots for a Merkle Tree scheme, or the on-chip roots and secret keys for PAT and TEC-Tree. ...
doi:10.1007/978-3-642-01004-0_1
fatcat:jmwvo4qelzeo7p7ayai6xqjerq
SCORAM
2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14
We then present scoram, a heuristic compact ORAM design optimized for secure computation protocols. ...
We therefore embark on a study of the circuit-complexity of several recently proposed ORAM constructions. ...
We would like to thank Marten van Dijk, Dov Gordon, Jonathan Katz, Kartik Nayak, and Saba Eskandarian for numerous helpful discussions. ...
doi:10.1145/2660267.2660365
dblp:conf/ccs/WangHCSS14
fatcat:mrefrwxeg5ekznre2sz7qanyy4
Fine-grained encryption for search and rescue operation on Internet of Things
2014
Asia-Pacific World Congress on Computer Science and Engineering
We propose a fine-grained access control system which is not only secure but also efficient. The practical experiments are conducted and its results demonstrate the lightweight cost in simulation. ...
To make the task more effective, they should share their information with each other but different countries have assorted sharing policies. ...
Then, the linear secret sharing scheme associated with access tree is used to construct share of for all relevant attributes . Third, the simulator choses ← . ...
doi:10.1109/apwccse.2014.7053860
fatcat:pzqqaki4sjgdrl3xjdux42p3za
Secure Multi-keyword Ranked Search over Encrypted Cloud Data
2016
IJARCCE
Tree based index structure is constructed and "Greedy Depth-first search" algorithm is used for efficient search results. The Secure kNN is used to encrypt index and query vector. ...
Cloud computing is a model for on-demand access to a shared pool of configurable computing resources. However, for storing sensitive information, Encryption should be done. ...
After that, the internal tree nodes are generated based on these leaf nodes.
2) Search Process of UDMRS Scheme: The search process of the UDMRS scheme is a recursive procedure upon the tree, named as ...
doi:10.17148/ijarcce.2016.51261
fatcat:j4orj33iszbbbmwxtcgwbkep54
« Previous
Showing results 1 — 15 out of 4,140 results