Trust management system design for the Internet of Things: A context-aware and multi-service approach

YB Saied, A Olivereau, D Zeghlache, M Laurent - Computers & Security, 2013 - Elsevier
This work proposes a new trust management system (TMS) for the Internet of Things (IoT).
The wide majority of these systems are today bound to the assessment of trustworthiness …

Comprehensive survey on privacy-preserving protocols for sealed-bid auctions

R Alvarez, M Nojoumian - Computers & Security, 2020 - Elsevier
The internet is a ubiquitous technology that has changed conventional human interactions.
In our present time, it is not unusual for financial transactions to take place virtually with …

[HTML][HTML] Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing

S Ali, SA Wadho, A Yichiet, ML Gan, CK Lee - Egyptian Informatics Journal, 2024 - Elsevier
Cloud computing security and data protection are becoming increasingly critical as its use
increases. The research we present demonstrates how undercover sharing techniques and …

CHURP: dynamic-committee proactive secret sharing

SKD Maram, F Zhang, L Wang, A Low… - Proceedings of the …, 2019 - dl.acm.org
We introduce CHURP (CHUrn-Robust Proactive secret sharing). CHURP enables secure
secret-sharing in dynamic settings, where the committee of nodes storing a secret changes …

Optimum secret sharing scheme secure against cheating

W Ogata, K Kurosawa, DR Stinson - SIAM Journal on Discrete Mathematics, 2006 - SIAM
Tompa and Woll introduced a problem of cheating in (k,n) threshold secret sharing schemes.
In this problem k-1 malicious participants aim to cheat an honest one by opening forged …

Mobile proactive secret sharing

DA Schultz, B Liskov, M Liskov - Proceedings of the twenty-seventh ACM …, 2008 - dl.acm.org
MPSS is a new way to do proactive secret sharing in asynchronous networks. MPSS
provides mobility: The group of nodes holding the shares of the secret can change at each …

Unconditionally secure social secret sharing scheme

M Nojoumian, DR Stinson, M Grainger - IET information security, 2010 - IET
The authors introduce the notion of a 'social secret sharing scheme', in which shares are
allocated based on a player's reputation and the way he/she interacts with other participants …

Practical robust DKG protocols for CSIDH

S Atapoor, K Baghery, D Cozzo, R Pedersen - International Conference on …, 2023 - Springer
Abstract A Distributed Key Generation (DKG) protocol is an essential component of
threshold cryptography. DKGs enable a group of parties to generate a secret and public key …

[PDF][PDF] On dealer-free dynamic threshold schemes.

M Nojoumian, DR Stinson - Adv. Math. Commun., 2013 - faculty.eng.fau.edu
In a threshold scheme, the sensitivity of the secret as well as the number of players may
fluctuate due to various reasons, eg, mutual trust may vary or the structure of the players' …

Social secret sharing in cloud computing using a new trust function

M Nojoumian, DR Stinson - 2012 Tenth Annual International …, 2012 - ieeexplore.ieee.org
We first review the notion of social secret sharing and its trust function. We then illustrate
how this construction can be used in cloud computing to create a self-organizing …