All or nothing at all

P D'Arco, NN Esfahani, DR Stinson - arXiv preprint arXiv:1510.03655, 2015 - arxiv.org
We continue a study of unconditionally secure all-or-nothing transforms (AONT) begun
in\cite {St}. An AONT is a bijective mapping that constructs s outputs from s inputs. We …

[HTML][HTML] Invertible binary matrices with maximum number of 2-by-2 invertible submatrices

Y Zhang, T Zhang, X Wang, G Ge - Discrete Mathematics, 2017 - Elsevier
For given positive integers t≤ s, what is the maximum number of t-by-t invertible submatrices
in an invertible binary matrix of order s? This purely combinatorial problem is posedrecently …

Generalizations of all-or-nothing transforms and their application in secure distributed storage

N Nasr Esfahani - 2021 - uwspace.uwaterloo.ca
An all-or-nothing transform is an invertible function that maps s inputs to s outputs such that,
in the calculation of the inverse, the absence of only one output makes it impossible for an …

基于网络编码的WSN 隐私保护研究

钱萍, 吴蒙, 刘镇, 尚艳羽 - 南京邮电大学学报: 自然科学版, 2015 - cqvip.com
如何保护敏感数据和传感器节点的位置信息在无线传感器网络的应用过程中不被泄露,
是无线传感器网络面临的重大挑战. 文中针对现有隐私保护技术的不足, 通过引入同态加密技术 …

Data Obfuscation in Network Coding to Mitigate the Effects of Pollution Attacks

RA Ortega-Vallejo, F de Asís López-Fuentes - International Congress of …, 2022 - Springer
Network coding is a technique mainly used to maximize the throughput, minimize the delay,
or optimize the reliability in the communication networks. However, network coding presents …

Evaluation of the maximum proportion of invertible submatrices in invertible binary matrices

J Hu - Proceedings of the 2022 5th International Conference …, 2022 - dl.acm.org
The research on all-or-nothing transform in cryptography leads to the problem that, for a
given positive integer, what is the density of invertible submatrices of any invertible matrix …

A secure network coding-based data gathering model and its protocol in wireless sensor networks

Q Xiao, K Zheng, S Luo, X Cui - International Journal of …, 2012 - Taylor & Francis
To provide security for data gathering based on network coding in wireless sensor networks
(WSNs), a secure network coding-based data gathering model is proposed, and a data …