Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








4,140 Hits in 2.7 sec

A Tree Based Recursive Information Hiding Scheme

A. Parakh, S. Kak
2010 2010 IEEE International Conference on Communications  
This paper presents a k-out-of-n recursive information hiding scheme based on an n-ary tree data structure.  ...  It may be used as a steganographic channel to transmit hidden information, which may be used for authentication and verification of shares and the reconstructed secret itself. Keywords.  ...  A comparison can be made between the efficiency of conventional secret sharing schemes and tree based recursive information hiding schemes.  ... 
doi:10.1109/icc.2010.5502430 dblp:conf/icc/ParakhK10 fatcat:hf6svafxi5f2nozokzkttyta6q

Space efficient secret sharing for implicit data security

Abhishek Parakh, Subhash Kak
2011 Information Sciences  
In other words, our technique can be looked upon as a new information dispersal scheme that provides near optimal space efficiency.  ...  This paper presents a k-threshold computational secret sharing technique that distributes a secret S into shares of size jSj kÀ1 , where jSj denotes the secret size.  ...  In order to achieve this we propose a new space efficient secret sharing scheme.  ... 
doi:10.1016/j.ins.2010.09.013 fatcat:y5k4pmslgvhrraqjdgq57pyshm

Consequence of Space Efficient Secret Sharing for Secure Multi-Path Data Delivery in WSN

N. Vijayarani, A. Senthilkumar
2017 Indian Journal of Science and Technology  
Methods/Analysis: In this paper, Space Efficient Secret Sharing (SESS) scheme is proposed for secured data delivery in the WSN.  ...  The SESS scheme primarily uses recursive polynomial interpolation and its secret size is optimized as k zz -1 .  ...  Parakh 6 had proposed a space efficient secret sharing scheme, which uses recursive hiding of secrets for enhancing the security level.  ... 
doi:10.17485/ijst/2017/v10i10/86080 fatcat:c275cz7fo5gbdbqgadbp3nikau

Poster

Mohamed Nabeel, Elisa Bertino
2011 Proceedings of the 18th ACM conference on Computer and communications security - CCS '11  
Secure collaborative applications need such flexible attribute based systems for managing and distributing group keys.  ...  Our scheme efficiently supports rekeying operations when the group changes due to joins or leaves of group members.  ...  Acknowledgements The work reported in this paper has been partially supported by the NSF grant 0712846 "IPS: Security Services for Healthcare Applications," and the MURI award FA9550-08-1-0265 from the  ... 
doi:10.1145/2046707.2093502 fatcat:l3irkoepwbcsnjyk5t5ecjuhji

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

2019 International Journal of Engineering  
By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage.  ...  In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a novel authentication mechanism  ...  In [16] , a new access structure as Blocked Linear Secret Sharing Scheme (BLSSS) is proposed for more scalability, but providing efficiency by managing partial blocks left for future works.  ... 
doi:10.5829/ije.2019.32.09c.09 fatcat:f5go5sayn5cnfaksa56m4e6ms4

A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing

Junsong Fu, Na Wang
2019 IEEE Access  
Different to existing schemes, the leaves in different access trees with the same attribute share the same secret number, which is employed to encrypt the documents.  ...  In CP-ABHE, we first construct a set of integrated access trees based on the documents' attribute sets.  ...  [39] also propose a file sharing scheme in cloud computing based on ABE and the security and efficiency of the scheme are evaluated. Li et al.  ... 
doi:10.1109/access.2019.2905346 fatcat:ef76muqdkfdhbhtgrikaqdhc3m

Attribute-Based Blind Signature Scheme Based on Elliptic Curve Cryptography

Rui Ma, Linyue Du
2022 IEEE Access  
The new scheme uses linear secret sharing scheme (LSSS) matrix technology that does not require recursive operation to achieve more flexible and fine-grained access control.  ...  Our scheme is a key policy attribute-based signature (KP-ABS).  ...  ACKNOWLEDGMENT The authors would like to thank the editors and reviewers for their recognition and hard work on this paper.  ... 
doi:10.1109/access.2022.3162231 fatcat:wwzgvt4cmbb33afeqcwycwrore

Efficient techniques for realizing geo-spatial access control

Mikhail J. Atallah, Marina Blanton, Keith B. Frikken
2007 Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07  
The problem of key management for access control systems has been well-studied, and the literature contains several schemes for hierarchy-based and temporal-based access control.  ...  Our main result is an efficient scheme with the following properties: (i) each user obtains a small constant number of secret keys that permit access to an arbitrary rectangular sub-grid, (ii) computation  ...  It builds a tree for S rooted at v, using a recursive construction.  ... 
doi:10.1145/1229285.1229301 dblp:conf/ccs/AtallahBF07 fatcat:67zzos7w3zdubkj3e63owvje7i

Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data

Hefeng Chen, Hsiao-Ling Wu, Chin-Chen Chang, Long-Sheng Chen
2019 Security and Communication Networks  
In this paper, a secret-sharing scheme is proposed to reduce the size of the blockchain transactions.  ...  Meanwhile, the proposed scheme was more efficient and secure compared to other state-of-the-art schemes that aim to reduce blockchain storage for industrial big data.  ...  Dehkordi and Mashhadi's scheme [19] focused on improving the efficiency of computations involved in share creation and secret reconstruction rather than space efficiency.  ... 
doi:10.1155/2019/9060756 fatcat:pstn4psq3jfdff4auurb6b5ogm

Efficient and Secure Ciphertext-Policy Attribute-Based Encryption Without Pairing for Cloud-Assisted Smart Grid

Yong Wang, Biwen Chen, Lei Li, Qiang Ma, Huicong Li, Debiao He
2020 IEEE Access  
As a promising encryption method for supporting fine-grained access control, attribute-based encryption (ABE) is widely given attention by the academia and industry.  ...  However, most existing schemes suffer from the efficiency problem limiting its deployment for the cloud-assisted smart grid, especially for resource-limited users.  ...  ACKNOWLEDGMENT The authors would like to thank all anonymous reviewers for their suggestions and comments for improvement of this article.  ... 
doi:10.1109/access.2020.2976746 fatcat:czbdvmczbbgj5gz745sgzz3p5u

Anonymous Electronic Health Record Sharing Scheme Based on Decentralized Hierarchical Attribute-based encryption in Cloud Environment

Xueyan Liu, Xiaotao Yang, Yukun Luo, Li Wang, Qiang Zhang
2020 IEEE Access  
ACKNOWLEDGMENT The authors wish to thank the anonymous referees for their patience in reading this manuscript and heir invaluable comments and suggestions.  ...  [28] proposed a privacypreserving decentralized ABE scheme for secure sharing of PHR based on Lewko and Waters's scheme, in which an anonymous secret key issuing protocol is used to hide GID.  ...  To sum up, an efficient and practical EHR sharing system must be distributed and should support anonymous key generation and save storage space. A.  ... 
doi:10.1109/access.2020.3035468 fatcat:jaqp6injcbcr7jweoalegdq35i

Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines [chapter]

Reouven Elbaz, David Champagne, Catherine Gebotys, Ruby B. Lee, Nachiketh Potlapally, Lionel Torres
2009 Lecture Notes in Computer Science  
Existing techniques for memory authentication that are not based on trees are described and their performance/security trade-off is discussed.  ...  After a description of the active attacks that threaten memory integrity, this paper surveys existing cryptographic techniques -namely integrity trees -allowing for memory authentication.  ...  Therefore, a scheme must be designed to manage tree roots for a Merkle Tree scheme, or the on-chip roots and secret keys for PAT and TEC-Tree.  ... 
doi:10.1007/978-3-642-01004-0_1 fatcat:jmwvo4qelzeo7p7ayai6xqjerq

SCORAM

Xiao Shaun Wang, Yan Huang, T-H. Hubert Chan, Abhi Shelat, Elaine Shi
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
We then present scoram, a heuristic compact ORAM design optimized for secure computation protocols.  ...  We therefore embark on a study of the circuit-complexity of several recently proposed ORAM constructions.  ...  We would like to thank Marten van Dijk, Dov Gordon, Jonathan Katz, Kartik Nayak, and Saba Eskandarian for numerous helpful discussions.  ... 
doi:10.1145/2660267.2660365 dblp:conf/ccs/WangHCSS14 fatcat:mrefrwxeg5ekznre2sz7qanyy4

Fine-grained encryption for search and rescue operation on Internet of Things

Depeng Li, Srinivas Sampalli, Zeyar Aung, John Williams, Abel Sanchez
2014 Asia-Pacific World Congress on Computer Science and Engineering  
We propose a fine-grained access control system which is not only secure but also efficient. The practical experiments are conducted and its results demonstrate the lightweight cost in simulation.  ...  To make the task more effective, they should share their information with each other but different countries have assorted sharing policies.  ...  Then, the linear secret sharing scheme associated with access tree is used to construct share of for all relevant attributes . Third, the simulator choses ← .  ... 
doi:10.1109/apwccse.2014.7053860 fatcat:pzqqaki4sjgdrl3xjdux42p3za

Secure Multi-keyword Ranked Search over Encrypted Cloud Data

Vaibhavi Kulkarni, Prof. Priya Pise
2016 IJARCCE  
Tree based index structure is constructed and "Greedy Depth-first search" algorithm is used for efficient search results. The Secure kNN is used to encrypt index and query vector.  ...  Cloud computing is a model for on-demand access to a shared pool of configurable computing resources. However, for storing sensitive information, Encryption should be done.  ...  After that, the internal tree nodes are generated based on these leaf nodes. 2) Search Process of UDMRS Scheme: The search process of the UDMRS scheme is a recursive procedure upon the tree, named as  ... 
doi:10.17148/ijarcce.2016.51261 fatcat:j4orj33iszbbbmwxtcgwbkep54
« Previous Showing results 1 — 15 out of 4,140 results