Secret sharing for cloud data security: a survey

V Attasena, J Darmont, N Harbi - The VLDB Journal, 2017 - Springer
Cloud computing helps reduce costs, increase business agility and deploy solutions with a
high return on investment for many types of applications. However, data security is of …

Generating shares of secret data

G Smith, R Boreli, A Friedman, M Djatmiko - US Patent 10,360,392, 2019 - Google Patents
This disclosure relates to generating shares of secret data represented by secret data
elements based on a first threshold for the number of shares that allow determining the …

Explicit low-bandwidth evaluation schemes for weighted sums of reed-solomon-coded symbols

HM Kiah, W Kim, S Kruglik, S Ling… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Motivated by applications in distributed storage, distributed computing, and homomorphic
secret sharing, we study communication-efficient schemes for computing linear …

Relative generalized Hamming weights of one-point algebraic geometric codes

O Geil, S Martin, R Matsumoto… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Security of linear ramp secret sharing schemes can be characterized by the relative
generalized Hamming weights of the involved codes. In this paper, we elaborate on the …

An Introduction to Secret Sharing: A Systematic Overview and Guide for Protocol Selection

S Krenn, T Lorünser - 2023 - books.google.com
This book provides an introduction to secret sharing, a key technology for practical
applications and higher-level cryptographic protocols. This survey analyzes existing work …

Unified approach to secret sharing and symmetric private information retrieval with colluding servers in quantum systems

M Hayashi, S Song - IEEE Transactions on Information Theory, 2023 - ieeexplore.ieee.org
This paper unifiedly addresses two kinds of key quantum secure tasks, ie, quantum versions
of secret sharing (SS) and symmetric private information retrieval (SPIR) by using multi …

[图书][B] Information-theoretic Cryptography

H Tyagi, S Watanabe - 2023 - books.google.com
This book offers a mathematical foundation for modern cryptography. It is primarily intended
as an introduction for graduate students. Readers should have basic knowledge of …

An IC-level countermeasure against laser fault injection attack by information leakage sensing based on laser-induced opto-electric bulk current density

K Matsuda, S Tada, M Nagata, Y Komano… - Japanese Journal of …, 2020 - iopscience.iop.org
Laser fault injection (LFI) attacks on cryptographic processor ICs are a critical threat to
information systems. This paper proposes an IC-level integrated countermeasure employing …

Hash function‐based secret sharing scheme designs

CS Chum, X Zhang - Security and communication networks, 2013 - Wiley Online Library
Secret sharing schemes create an effective method to safeguard a secret by dividing it
among several participants. By using hash functions and the herding hashes technique, we …

Secure User Authentication with Information Theoretic Security using Secret Sharing Based Secure Computation

K Iwamura, AAAM Kamal - IEEE Access, 2025 - ieeexplore.ieee.org
When using an insecure communication channel, the initial step involves authenticating the
user (verifying the other party) to ensure the legitimacy of the communication partner …