Asian Journal of Information Technology

Year: 2015
Volume: 14
Issue: 2
Page No. 74 - 83

Analysis and Comparison the Security and Performance of Secret Sharing Schemes

Authors : Aisha Abdallah and Mazleena Salleh

References

Annamalai, U. and K. Thanushkodi, 2013. Medical image authentication with enhanced watermarking techhnique through visual cryptography. J. Theor. Applied Inform. Technol., 57: 484-494.

Blakley, G.R., 1979. Safeguarding cryptographic keys. Proc. Natl. Comput. Conf. AFIPS., 48: 313-317.
CrossRef  |  Direct Link  |  

Chor, B., E. Kushilevitz, O. Goldreich and M. Sudan, 1998. Private information retrieval. J. ACM, 45: 965-981.
CrossRef  |  Direct Link  |  

Dautrich, J.L. and C.V. Ravishankar, 2012. Security Limitations of Using Secret Sharing for Data Outsourcing. In: Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13, 2012. Proceedings, Cuppens-Boulahia, N., F. Cuppens and J. Garcia-Alfaro (Eds.). Springer, Heidelberg, Germany, ISBN-13: 978-3-642-31540-4, pp: 145-160.

Ermakova, T. and B. Fabian, 2013. Secret sharing for health data in multi-provider clouds. Secret sharing for health data in multi-provider clouds. Proceedings of the 15th Conference on Business Informatics, July 15-18, 2013, Vienna, pp: 93-100.

Fabian, B., T. Ermakova and P. Junghanns, 2014. Collaborative and secure sharing of healthcare data in multi-clouds. Inform. Syst., 48: 132-150.
Direct Link  |  

Gentry, C., 2009. Fully homomorphic encryption using ideal lattices. Proceedings of the 41st Annual ACM Symposium on Theory of Computing, December 02-04, 2009, Seoul, Korea, pp: 169-178.

Guo, C. and C.C. Chang, 2013. A construction for secret sharing scheme with general access structure. J. Inform. Hiding Multimedia Signal Process., 4: 1-8.

Iftene, S., 2006. Secret sharing schemes with applications in security protocols. Sci. Ann. Cuza Univ., 16: 63-96.

Kantarcioglu, C. and M. Clifton, 2005. Security Issues in Querying Encrypted Data. In: Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings, Jajodia, S. and D. Wijesekera (Eds.) Springer, Heidelberg, Germany, ISBN-13: 978-3-540-31937-5, pp: 325-337.

Krawczyk, H., 1993. Distributed fingerprints and secure information. Proceedings of the 12th Annual ACM Symposium on Principles of Distributed Computing, August 15-18, 1993, Ithaca, New York, USA., pp: 207-218.

Krawczyk, H., 1994. Secret Sharing Made Short. In: Advances in Cryptology CRYPTO'93: 13th Annual International Cryptology Conference Santa Barbara, California, USA August 22-26, 1993, Proceedings, Stinson, D.R. (Ed.). Springer, Heidelberg, Germany, ISBN-13: 978-3-540-48329-8, pp: 136-146.

Nirmala, S.J., S.M.S. Bhanu and A.A. Patel, 2012. A comparative study of the secret sharing algorithms for secure data in the cloud. Int. J. Cloud Comput.: Serv. Archit., 2: 63-71.
Direct Link  |  

Pang, L.J., H.X. Li and Y.M. Wang, 2006. A Secure and Efficient Secret Sharing Scheme with General Access Structures. In: Lecture Notes in Computer Science Fuzzy Systems and Knowledge Discovery: Third International Conference, FSKD 2006, Xi'an, China, September 24-28, 2006. Proceedings, Wang, L., L. Jiao, G. Shi, X. Li and J. Liu (Eds.). Springer, Heidelberg, Germany, ISBN-13: 978-3-540-45917-0, pp: 646-649.

Plank, J.S. and Y. Ding, 2005. Correction to the 1997 tutorial on reed-solomon coding. Software Pract. Exp., 35: 189-194.
CrossRef  |  

Rabin, M.O., 1989. Efficient dispersal of information for security, load balancing and fault tolerance. J. ACM, 36: 335-348.
CrossRef  |  Direct Link  |  

Resch, J.K. and J.S. Plank, 2011. AONT-RS: Blending security and performance in dispersed storage systems. Proceedings of the 9th USENIX Conference on File and Storage Technologies, February 15-17, 2011, San Jose, CA., USA., pp: 14-14.

Rogaway, P. and M. Bellare, 2007. Robust computational secret sharing and a unified account of classical secret-sharing goals. Proceedings of the 14th ACM Conference on Computer and Communications Security, October 29-November 2, 2007, Alexandria, VA, USA., pp: 172-184.

Saramentovas, A. and P. Ruzgys, 2007. Analyzing and implementing a reed-solomon decoder for forward error correction in ADSL. Aalborg University, Institute of Electronic Systems Applied Signal Processing and Implementation, Aalborg, Denmark.

Shamir, A., 1979. How to share a secret. Commun. ACM, 22: 612-613.
CrossRef  |  Direct Link  |  

Slamanig, D. and C. Hanser, 2012. On cloud storage and the cloud of clouds approach. Proceedings of the International Conference for Internet Technology and Secured Transactions, December 10-12, 2012, London, pp: 649-655.

Takahashi, S., S. Kobayashi, H. Kang and K. Iwamura, 2013. Secret sharing scheme for cloud computing using IDs. Proceedings of the IEEE 2nd Global Conference on Consumer Electronics, October 1-4, 2013, Tokyo, pp: 528-529.

Venkataramana, K. and M. Padmavathamma, 2012. A threshold secure data sharing scheme for federated clouds. Int. J. Res. Comput. Sci., 2: 21-28.
Direct Link  |  

Wang, C., Z. Chen, W. Yao, D. Xiao, C. Wu and J. Liu, 2010. An efficient and secure splitting algorithm for distributed storage systems. Chain Commun., 7: 89-95.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved