2017
DOI: 10.1002/cpe.4275
|View full text |Cite
|
Sign up to set email alerts
|

Linguistic techniques for cryptographic data sharing algorithms

Abstract: This publication presents algorithms for protecting data from unauthorised access to it. A special role among information protection algorithms is played by algorithms of data splitting and sharing which allow the information to be distributed within a selected group of secret trustees. This paper describes protocols of the above type and also suggests a way of using the proposed solutions for linguistic information sharing. Linguistic message-sharing algorithms are described as a class of protocols for protec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
41
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
5

Relationship

3
2

Authors

Journals

citations
Cited by 39 publications
(41 citation statements)
references
References 19 publications
0
41
0
Order By: Relevance
“…Moreover, the potential of such presented systems architecture lies in the fact that it is able to automatically update and adapt itself, working with as many data are available. In addition, it is capable, through Ontologies and CDT, to interface with other similar systems based on different contexts sharing and exchanging knowledge in order to increasingly improve its performance …”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, the potential of such presented systems architecture lies in the fact that it is able to automatically update and adapt itself, working with as many data are available. In addition, it is capable, through Ontologies and CDT, to interface with other similar systems based on different contexts sharing and exchanging knowledge in order to increasingly improve its performance …”
Section: Discussionmentioning
confidence: 99%
“…In addition, it is capable, through Ontologies and CDT, to interface with other similar systems based on different contexts sharing and exchanging knowledge in order to increasingly improve its performance. 30…”
Section: Discussionmentioning
confidence: 99%
“…The development of IT techniques and a need to collect and store increasingly larger sets of secret data resulted in the need to develop new data protection protocols. This is why the class of data sharing algorithms has been enhanced by new solutions, described in the literature as linguistic and biometric threshold schemes …”
Section: Introductionmentioning
confidence: 99%
“…This means that in linguistic threshold schemes, there is an addition of splitting the secret among protocol participants based on the knowledge they have on the issue concealed. An example of such tasks are linguistic CAPTCHA codes, described in, among others, previous works …”
Section: Introductionmentioning
confidence: 99%
“…14,15 Linguistic shadow is one of all shadows in splitting process. This shadow can be named "linguistic shadow," because in this part of secret, only linguistic data are included.…”
Section: Introductionmentioning
confidence: 99%