2016 IEEE International Conference on Consumer Electronics (ICCE) 2016
DOI: 10.1109/icce.2016.7430695
|View full text |Cite
|
Sign up to set email alerts
|

Performance evaluation on data management approach for multiple clouds using secret sharing scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…Using a one-way hash function, they proposed a TMSSS scheme, in which the shares can be reused by some technical measures, when we wish to share new secrets. In multi-use or multi-stage secret sharing schemes, the following two general security requirements are needed: (1) While recovering the secret(s), the participants should not reveal the original shares. (2) The secrecy of the other unreconstructed secrets should be computationally independent from the reconstructed secrets.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Using a one-way hash function, they proposed a TMSSS scheme, in which the shares can be reused by some technical measures, when we wish to share new secrets. In multi-use or multi-stage secret sharing schemes, the following two general security requirements are needed: (1) While recovering the secret(s), the participants should not reveal the original shares. (2) The secrecy of the other unreconstructed secrets should be computationally independent from the reconstructed secrets.…”
Section: Introductionmentioning
confidence: 99%
“…Secret sharing schemes are cryptographic primitives to protect a secret by sharing it to some values and assign them to different users. These schemes are used in many different applications such as cloud computing [1], key management in sensor networks [2], electronic voting [3] and electronic cash [4]. Secret sharing provides solutions for data privacy, availability, integrity and verifiability, which makes it suitable for these applications.…”
Section: Introductionmentioning
confidence: 99%
“…Secret sharing is a cryptographic primitive with many applications such as key management in sensor networks [1], electronic cash [2], electronic voting [3], and cloud computing [4]. A secret sharing scheme splits a secret among a set of parties, called participants, in such a way that some authorized subsets of the participants can reconstruct the secret using their assigned values, called shares, by a trusted third party named dealer.…”
Section: Introductionmentioning
confidence: 99%