J Shi, R Rao, Y Song, X Wang, B Yi, Q He, C Zeng… - Computer Networks, 2024 - Elsevier
With the proliferation of data-intensive applications, there arises an urgent demand for a substantial amount of cloud services to meet their requirements for data analysis. This …
CN Yang, P Li, HH Cheng, HC Kuo… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Secret sharing (SS) is a threshold technology that shares a secret value by generating and distributing shares in the way that a set of any shares can recover the secret. On the other …
J Shi, B Yi, X Wang, M Huang, Y Song… - IEEE/ACM …, 2024 - ieeexplore.ieee.org
The current global economy is undergoing a transformative phase, emphasizing collaboration among multiple competing entities rather than monopolization. Economic …
S Feng, LF Zhang - IEEE Transactions on Services Computing, 2023 - ieeexplore.ieee.org
In single-cloud storage, ciphertext-policy attribute-based encryption (CP-ABE) allows one to encrypt any data under an access structure to a cloud server, specifying what attributes are …
M Zong, A Hekmati, M Guastalla, Y Li… - arXiv preprint arXiv …, 2024 - arxiv.org
This paper identifies and analyzes applications in which Large Language Models (LLMs) can make Internet of Things (IoT) networks more intelligent and responsive through three …
A Malik, MZ Hussain, M Mustafa, B Sattar… - UCP Journal of …, 2024 - jbr.ucp.edu.pk
Abstract The Internet of Things (IoT) has become a foundational element of the digital infrastructure, extending its connectivity across various sectors and embedding intelligence …
A Roy, BK Roy, K Sakurai, S Talnikar - Cryptology ePrint Archive, 2024 - eprint.iacr.org
The field of verifiable secret sharing schemes was introduced by Verheul et al. and has evolved over time, including well-known examples by Feldman and Pedersen. Stinson …
M Moltafet, HR Sadjadpour… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
We provide an encryption protocol for storing highly confidential data of a user on a public cloud storage. We show that the protocol provides unconditional security. More specifically …
Z Cao, L Liu - Cryptology ePrint Archive, 2024 - eprint.iacr.org
We show that the data storage scheme [IEEE/ACM Trans. Netw., 2023, 31 (4), 1550-1565] is flawed due to the false secret sharing protocol, which requires that some random $4\times …