Cloud outsourcing secret sharing scheme against covert adversaries
In order to make computationally weak cloud tenants can reconstruct a secret with efficiency and fairness,a cloud outsourcing secret sharing scheme was proposed,which combined cloud outsourcing computation with secret sharing scheme.In the process of outsourcing secret sharing,cloud tenants just nee...
Saved in:
Main Authors: | En ZHANG, Kui GENG, Wei JIN, Yong-jun LI, Yun-qing SUN, Feng-hua LI |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2017-05-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017100/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Fair secret sharing scheme using asymmetric bivariate polynomial
by: Wenwei YANG, et al.
Published: (2019-02-01) -
Covert communication method based on tripartite generative adversarial network
by: Jihong YU, et al.
Published: (2023-11-01) -
Advance Sharing Procedures for the Ramp Quantum Secret Sharing Schemes With the Highest Coding Rate
by: Ryutaroh Matsumoto
Published: (2025-01-01) -
Cryptanalysis of a non-interactive protocol for member expansion in a secret sharing scheme
by: XU Jing-fang1, et al.
Published: (2009-01-01) -
ECMO: An Efficient and Confidential Outsourcing Protocol for Medical Data
by: Xiangyi Meng, et al.
Published: (2025-01-01)