Data security storage and transmission framework for AI computing power platforms. [PDF]
Chen J +5 more
europepmc +1 more source
Eliminating single points of trust: a hybrid quantum and post-quantum blockchain with distributed key generation. [PDF]
Goh KW +5 more
europepmc +1 more source
Related searches:
Efficient Privacy Preserving in IoMT With Blockchain and Lightweight Secret Sharing
IEEE Internet of Things Journal, 2023Internet of Medical Things (IoMT) aggregates a series of smart medical devices and fully uses the collected health data to improve user experience, medical resource utilization, and full life cycle protection.
Chaoyang Li +5 more
semanticscholar +1 more source
Waldo: A Private Time-Series Database from Function Secret Sharing
IEEE Symposium on Security and Privacy, 2022Applications today rely on cloud databases for storing and querying time-series data. While outsourcing storage is convenient, this data is often sensitive, making data breaches a serious concern.
Emma Dauterman +3 more
semanticscholar +1 more source
A Generic Federated Recommendation Framework via Fake Marks and Secret Sharing
ACM Trans. Inf. Syst., 2022With the implementation of privacy protection laws such as GDPR, it is increasingly difficult for organizations to legally collect users’ data.
Zhaohao Lin +3 more
semanticscholar +1 more source
Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing
IEEE transactions on circuits and systems for video technology (Print), 2022Reversible data hiding in encrypted images (RDH-EIs) has attracted increasing attention since it can protect the privacy of original images while exactly extracting the embedded data.
Zhongyun Hua +4 more
semanticscholar +1 more source
COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services
IEEE Symposium on Security and Privacy, 2022Byzantine Fault-Tolerant (BFT) State Machine Replication (SMR) is a classical paradigm for implementing trustworthy services that has received renewed interest with the emergence of blockchains and decentralized infrastructures.
Robin Vassantlal +3 more
semanticscholar +1 more source
Compressive Imaging Encryption with Secret Sharing Metasurfaces
Advanced Optical Materials, 2022Exploiting various degrees of freedom of light, metasurfaces have unique advantages in multiple‐channel information storage and demonstration, which thereby provides a novel platform to convey the keys and cipher images for different encryptions ...
Peixia Zheng +6 more
semanticscholar +1 more source
SIGMA: Secure GPT Inference with Function Secret Sharing
IACR Cryptology ePrint ArchiveSecure 2-party computation (2PC) enables secure inference that offers protection for both proprietary machine learning (ML) models and sensitive inputs to them.
Kanav Gupta +6 more
semanticscholar +1 more source
Dynamic Multi‐Party to Multi‐Party Quantum Secret Sharing based on Bell States
Advanced Quantum TechnologiesQuantum secret sharing as a privacy‐preserving scheme necessitating collaborative efforts from all participating users to collectively recover encrypted information.
Yuan Tian +4 more
semanticscholar +1 more source

