A hyperledger fabric-based system framework for healthcare data management

Q Wang, S Qin - Applied Sciences, 2021 - mdpi.com
This study examined the requirements for privacy-preserving and interoperability in
healthcare data sharing and proposed a blockchain-based solution. The Hyperledger Fabric …

On modular (CRT-based) secret sharing

NN Shenets - Journal of Computer Virology and Hacking Techniques, 2024 - Springer
Secret sharing scheme (SSS) allows to share some secret s among n parties in such a way
that only certain subsets of them can recover the secret. The first SSSs were independently …

An Efficient Method for Realizing Contractions of Access Structures in Cloud Storage

S Feng, LF Zhang - IEEE Transactions on Services Computing, 2023 - ieeexplore.ieee.org
In single-cloud storage, ciphertext-policy attribute-based encryption (CP-ABE) allows one to
encrypt any data under an access structure to a cloud server, specifying what attributes are …

Protocol for secure and reliable data transmission in MANET based on modular arithmetic

M Deryabin, M Babenko, A Nazarov… - … on Engineering and …, 2019 - ieeexplore.ieee.org
Mobile Ad-Hoc Networks is gaining ground due to the proliferation of simple low-power
devices and the introduction of the concepts of the Internet of Things, smart city, and smart …

The study of monotonic core functions and their use to build RNS number comparators

M Babenko, SJ Piestrak, N Chervyakov, M Deryabin - Electronics, 2021 - mdpi.com
A non-positional residue number system (RNS) enjoys particularly efficient implementation
of addition and multiplication, but non-modular arithmetic operations in RNS-like number …

Comparative performance analysis of information dispersal methods

M Deryabin, N Chervyakov, A Tchernykh… - … 24th Conference of …, 2019 - ieeexplore.ieee.org
In this paper, we present an analysis of information dispersal methods for using in
distributed storage systems, processing, and transmission of data. We provide a …

Distributed secret sharing scheme based on the high-dimensional rotation paraboloid

S Qin, Z Tan, B Zhang, F Zhou - Journal of Information Security and …, 2021 - Elsevier
Secret sharing of (k, n)-threshold is naturally used to assist in security-assurance
applications in smart systems. It can ensure a high level of data security and reliability. Most …

Безопасная и надежная передача данных в MANET на основе принципов вычислительно стойкого разделения секрета

НИ Червяков, МА Дерябин, АС Назаров… - Труды Института …, 2019 - cyberleninka.ru
Мобильные неиерархические сети (MANET) требуют особых подходов к
проектированию и выбору алгоритмов передачи данных и обеспечения безопасности …

Broadcast complexity and adaptive adversaries in verifiable secret sharing

SA Hosseini Beghaeiraveri, M Izadi… - Security and …, 2020 - Wiley Online Library
Verifiable secret sharing (VSS) is one of the basic problems in the theory of distributed
cryptography and has an important role in secure multiparty computation. In this case, it is …

[引用][C] МЕТОДЫ ПОВЫШЕНИЯ НАДЕЖНОСТИ ХРАНИМЫХ И ОБРАБАТЫВАЕМЫХ ДАННЫХ

ВН Перекрестова - СОВРЕМЕННЫЕ ТЕХНОЛОГИИ В …, 2019 - elibrary.ru
В статье исследуются современные подходы к повышению надежности хранения
данных в облачной среде. Рассматриваются подходы к построению взвешенных схем …