Results 271 to 280 of about 3,018,405 (324)

Efficient Privacy Preserving in IoMT With Blockchain and Lightweight Secret Sharing

IEEE Internet of Things Journal, 2023
Internet of Medical Things (IoMT) aggregates a series of smart medical devices and fully uses the collected health data to improve user experience, medical resource utilization, and full life cycle protection.
Chaoyang Li   +5 more
semanticscholar   +1 more source

Waldo: A Private Time-Series Database from Function Secret Sharing

IEEE Symposium on Security and Privacy, 2022
Applications today rely on cloud databases for storing and querying time-series data. While outsourcing storage is convenient, this data is often sensitive, making data breaches a serious concern.
Emma Dauterman   +3 more
semanticscholar   +1 more source

A Generic Federated Recommendation Framework via Fake Marks and Secret Sharing

ACM Trans. Inf. Syst., 2022
With the implementation of privacy protection laws such as GDPR, it is increasingly difficult for organizations to legally collect users’ data.
Zhaohao Lin   +3 more
semanticscholar   +1 more source

Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing

IEEE transactions on circuits and systems for video technology (Print), 2022
Reversible data hiding in encrypted images (RDH-EIs) has attracted increasing attention since it can protect the privacy of original images while exactly extracting the embedded data.
Zhongyun Hua   +4 more
semanticscholar   +1 more source

COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services

IEEE Symposium on Security and Privacy, 2022
Byzantine Fault-Tolerant (BFT) State Machine Replication (SMR) is a classical paradigm for implementing trustworthy services that has received renewed interest with the emergence of blockchains and decentralized infrastructures.
Robin Vassantlal   +3 more
semanticscholar   +1 more source

Compressive Imaging Encryption with Secret Sharing Metasurfaces

Advanced Optical Materials, 2022
Exploiting various degrees of freedom of light, metasurfaces have unique advantages in multiple‐channel information storage and demonstration, which thereby provides a novel platform to convey the keys and cipher images for different encryptions ...
Peixia Zheng   +6 more
semanticscholar   +1 more source

SIGMA: Secure GPT Inference with Function Secret Sharing

IACR Cryptology ePrint Archive
Secure 2-party computation (2PC) enables secure inference that offers protection for both proprietary machine learning (ML) models and sensitive inputs to them.
Kanav Gupta   +6 more
semanticscholar   +1 more source

Dynamic Multi‐Party to Multi‐Party Quantum Secret Sharing based on Bell States

Advanced Quantum Technologies
Quantum secret sharing as a privacy‐preserving scheme necessitating collaborative efforts from all participating users to collectively recover encrypted information.
Yuan Tian   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy