Distributed secure storage scheme based on sharding blockchain

J Wang, H Chenchen, Y Xiaofeng… - Computers …, 2022 - centaur.reading.ac.uk
Distributed storage can store data in multiple devices or servers to improve data security.
However, in today's explosive growth of network data, traditional distributed storage scheme …

A group key exchange and secure data sharing based on privacy protection for federated learning in edge‐cloud collaborative computing environment

W Song, M Liu, T Baker, Q Zhang… - International Journal of …, 2023 - Wiley Online Library
Federated learning (FL) is widely used in internet of things (IoT) scenarios such as health
research, automotive autopilot, and smart home systems. In the process of model training of …

PURA-SCIS protocol: A novel solution for cloud-based information sharing protection for sectoral organizations

FA Putra, K Ramli, N Hayati, TS Gunawan - Symmetry, 2021 - mdpi.com
Over recent years, the incidence of data breaches and cyberattacks has increased
significantly. This has highlighted the need for sectoral organizations to share information …

Time-Specific Integrity Service in MQTT Protocol

H Yan, H Hu, Q Ye - 2024 23rd ACM/IEEE International …, 2024 - ieeexplore.ieee.org
Message Queuing Telemetry Transport (MQTT) is a classic transmission protocol in IoT
scenarios, where a subscriber subscribes to the messages, and a publisher publishes the …

A fully dynamic multi-secret sharing scheme with redundant authorization

F Li, H Hu, S Zhu, J Yan - Cryptography and Communications, 2024 - Springer
Based on Shamir's threshold scheme and Elliptic curve cryptography, a fully dynamic multi-
secret sharing scheme with redundant authorization is proposed for the general access …

Pengembangan Financial Service Information Sharing and Analysis Center (FS-ISAC) di Indonesia dengan Pendekatan ENISA ISAC in a Box

FA Putra, F Aferudin - Info Kripto, 2022 - infokripto.poltekssn.ac.id
Abstract Pembentukan grup Information Sharing and Anlysis Center (ISAC) menjadi salah
satu best practice yang dapat dijalankan dalam menghadapi ancaman siber yang semakin …

Game-based security proofs for verifiable secret sharing schemes in the standard model

S Mashhadi - Information Security Journal: A Global Perspective, 2023 - Taylor & Francis
In a verifiable secret sharing (VSS) scheme, each participant can check cheating by the
dealer or the other participants. In this work, we construct a VSS scheme with the strongest …

Optimizing Threshold Secret Sharing with Hierarchical Access Structures in ECDSA

ASL Sumule, MW Ardyani, NPR Adiati… - … on Internet of Things …, 2024 - ieeexplore.ieee.org
Secret sharing schemes divide sensitive information into multiple parts for secure
distribution. The (t, n) threshold multi-secret sharing scheme based on Verifiable Secret …

[PDF][PDF] Protected Fair Secret Sharing Based Bivariate Asymmetric Polynomials in Satellite Network.

Y Han, J Yu, G Hu, C Pan, D Xie, C Guo… - … , Materials & Continua, 2022 - cdn.techscience.cn
Verifiable secret sharing mainly solves the cheating behavior between malicious
participants and the ground control center in the satellite network. The verification stage can …

Pembentukan Ekosistem Local Government Information Sharing and Analysis Center (LocalGov-ISAC) dengan Toolkit ENISA ISAC in a Box pada Sektor Pemerintah …

FA Putra - Info Kripto, 2022 - infokripto.poltekssn.ac.id
Abstract Information and Analysis Center (ISAC) merupakan best practice yang dapat
diterapkan untuk membantu organisasi dalam mengatasi dampak serangan siber, salah …