Computationally secure threshold secret sharing scheme with minimal redundancy
暂无分享,去创建一个
[1] C. H. Huang. A Fully Parallel Mixed-Radix Conversion Algorithm for Residue Number Applications , 1983, IEEE Transactions on Computers.
[2] Andrei Tchernykh,et al. AC-RRNS: Anti-collusion secured data sharing scheme for cloud storage , 2018, Int. J. Approx. Reason..
[3] E.-G. Talbi,et al. Positional Characteristics for Efficient Number Comparison over the Homomorphic Encryption , 2019, Programming and Computer Software.
[4] Seungjoo Kim,et al. RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis , 2003, IEEE Trans. Computers.
[5] Andrei Tchernykh,et al. Performance evaluation of secret sharing schemes with data recovery in secured and reliable heterogeneous multi-cloud storage , 2019, Cluster Computing.
[6] Ferucio Laurentiu Tiplea,et al. On the Asymptotic Idealness of the Asmuth-Bloom Threshold Secret Sharing Scheme , 2018, IACR Cryptol. ePrint Arch..
[7] Uwe Schwiegelshohn,et al. Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability , 2016, J. Comput. Sci..
[8] Arutyun Avetisyan,et al. Bi-objective Analysis of an Adaptive Secure Data Storage in a Multi-cloud , 2018, CARLA.
[9] Pascal Bouvry,et al. Configurable cost-quality optimization of cloud-based VoIP , 2019, J. Parallel Distributed Comput..
[10] Zhihui Du,et al. Experimental Analysis of Secret Sharing Schemes for Cloud Storage Based on RNS , 2017, CARLA.
[11] Arutyun Avetisyan,et al. Scalable Data Storage Design for Nonstationary IoT Environment With Adaptive Security and Reliability , 2020, IEEE Internet of Things Journal.
[12] Sorin Cotofana,et al. An O(n) Residue Number System to Mixed Radix Conversion technique , 2009, 2009 IEEE International Symposium on Circuits and Systems.
[13] P. A. Lyakhov,et al. An Approximate Method for Comparing Modular Numbers and its Application to the Division of Numbers in Residue Number Systems* , 2014 .
[14] John Bloom,et al. A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.
[15] Piero Maestrini,et al. Error Correcting Properties of Redundant Residue Number Systems , 1973, IEEE Transactions on Computers.
[16] Mustafa Kaiiali,et al. A secure data outsourcing scheme based on Asmuth–Bloom secret sharing , 2016, CloudCom 2016.
[17] Ferucio Laurentiu Tiplea,et al. A necessary and sufficient condition for the asymptotic idealness of the GRS threshold secret sharing scheme , 2014, Inf. Process. Lett..
[18] Nikolay I. Chervyakov,et al. Residue-to-binary conversion for general moduli sets based on approximate Chinese remainder theorem , 2017, Int. J. Comput. Math..
[19] Nikolay I. Chervyakov,et al. AR-RRNS: Configurable reliable distributed data storage systems for Internet of Things to ensure security , 2017, Future Gener. Comput. Syst..
[20] Bart Preneel,et al. On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem , 2002, Public Key Cryptography.