2019
DOI: 10.1002/cpe.5363
|View full text |Cite
|
Sign up to set email alerts
|

Resolving a common vulnerability in secret sharing scheme–based data outsourcing schemes

Abstract: Summary Every day, the amount of generated data from different resources are increasing significantly and posing new serious challenges in terms of data storage and maintaining. As a solution, outsourcing data to a public cloud server with high storage and processing capacity sounds reasonable in comparison with storing in local data storage. Therefore, the database as a service (DaaS) paradigm has gained much popularity over the last decade since the introduction of cloud services. Storing confidential data i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(14 citation statements)
references
References 30 publications
(59 reference statements)
0
14
0
Order By: Relevance
“…As observed in previous works [22]- [24], potentially there are two types of attacks against secret sharing-based outsourcing schemes. The first type of attacks, called inference attacks, will be explained in detail in Section III-C1.…”
Section: Introduction a Problem Statementmentioning
confidence: 72%
See 4 more Smart Citations
“…As observed in previous works [22]- [24], potentially there are two types of attacks against secret sharing-based outsourcing schemes. The first type of attacks, called inference attacks, will be explained in detail in Section III-C1.…”
Section: Introduction a Problem Statementmentioning
confidence: 72%
“…Gcd-based attacks were first discovered in [24] whereas compromised cloud servers are able to retrieve the distribution vector X, by recovering each of the individual reconstruction element x i based on the shares they received. It has been claimed in [24] that, subtracting any two shares that are associated with the same secret will result in a multiple of the reconstruction element x i . To see this, readers can refer to Equation ( 5) below, where (c vn * x i + v) is the share generated from the secret v for an n-th time and (c vm * x i + v) is the share for an m-th time.…”
Section: ) Gcd-based Attacksmentioning
confidence: 99%
See 3 more Smart Citations