2021
DOI: 10.1016/j.jisa.2021.102869
|View full text |Cite
|
Sign up to set email alerts
|

Collusion resistant secret sharing scheme for secure data storage and processing over cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 25 publications
0
4
0
1
Order By: Relevance
“…Moreover, they possess the additive homomorphic properties required to compute linear operations (sum, mean etc) in encrypted domain. In this work, we utilize the design of LFSR based random vector over Fq [20].…”
Section: Proposed Homomorphic Encryption Scheme Based On Polar Codesmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, they possess the additive homomorphic properties required to compute linear operations (sum, mean etc) in encrypted domain. In this work, we utilize the design of LFSR based random vector over Fq [20].…”
Section: Proposed Homomorphic Encryption Scheme Based On Polar Codesmentioning
confidence: 99%
“…If the initial states of LFSR are linearly independent, then keystreams will also be linearly independent. However, only L linearly independent initial states can be generated by an LFSR of length L. A scheme for generating L linearly independent initial states from an initial key, k of length L through cyclic shifting operation is also proposed [20]. Since the initial states derived through cyclic shifts lacks security, a more secure method is proposed.…”
Section: ) Key Generationmentioning
confidence: 99%
“…A modified ramp secret sharing (MRSS) approach was designed in [19] to minimize the storage overhead with privacypreserving data processing applications.…”
Section: Related Workmentioning
confidence: 99%
“…Pesquisas envolvendo a privacidade de dados na área da saúde vem crescendo cada dia mais. Podemos citar, por exemplo, os trabalhos de Ermakova & Fabian (2013); Sarosh et al (2021); Lakshmi et al (2021), que utilizam Secret Sharing para tal finalidade.…”
Section: Introductionunclassified