2018
DOI: 10.1016/j.ijar.2018.07.010
|View full text |Cite
|
Sign up to set email alerts
|

AC-RRNS: Anti-collusion secured data sharing scheme for cloud storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
2

Relationship

2
7

Authors

Journals

citations
Cited by 44 publications
(26 citation statements)
references
References 31 publications
0
25
0
1
Order By: Relevance
“…This method, instead of an approximate conversion (a conversion with the excess flow), estimates and uses the exact value for the conversion [19,[21][22][23][24][25]. Equation (17) can be reformulated to find as follows:…”
Section: Extension Methods Using Floating-point Arithmeticmentioning
confidence: 99%
“…This method, instead of an approximate conversion (a conversion with the excess flow), estimates and uses the exact value for the conversion [19,[21][22][23][24][25]. Equation (17) can be reformulated to find as follows:…”
Section: Extension Methods Using Floating-point Arithmeticmentioning
confidence: 99%
“…An alternative way is to use RRNS, which on the one hand, is the error correction code, which allows restoring the result when an error occurs, and on the other hand, is a secret sharing scheme that ensures data security [14]. Tchernykh et al [33] show how the security of stored data depends on the RRNS parameters. 2L-RRNS can increase the number of detected and correctable errors compared to 1L-RRNS [23].…”
Section: Distributed Storage Securitymentioning
confidence: 99%
“…The Gentry C Cryptosystem is safe and resistant to various attacks but has high computational complexity, which does not allow it to be used in practical applications. To reduce the computational complexity, [33] proposed an analog of the Gentry C scheme based on the RNS. Tchernykh et al [16] showed that RNS provides the necessary level of security and reduces the computational complexity of encoding and decoding.…”
Section: Privacy-preserving For Cloud Computingmentioning
confidence: 99%
“…Компромиссом являются вычислительно стойкие схемы разделения секрета [4], которые обеспечивают достаточную конфиденциальность при сравнительно небольшой избыточности. Примером может быть основанная на СОК AC-RRNS, предложенная в работе [41] как метод кодирования для облачного хранения данных. Другая вычислительно стойкая схема разделения секрета предложена в работе [5] и основывается на симметричном шифровании и распределении данных с помощью СОК.…”
Section: система остаточных классов и схемы разделения секретаunclassified