2015
DOI: 10.1007/978-3-319-22915-7_2
|View full text |Cite
|
Sign up to set email alerts
|

Multilevel Threshold Secret Sharing in Distributed Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(15 citation statements)
references
References 19 publications
0
15
0
Order By: Relevance
“…As for key protection aspect, a multilevel threshold secret sharing scheme [13] is conducted by duplicating the secret key and then distributing into multiple resource providers to ensure availability. Moreover, key-insulated symmetric cryptography [8] is presented to against the compromise of keys from software-based attack such as malware.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…As for key protection aspect, a multilevel threshold secret sharing scheme [13] is conducted by duplicating the secret key and then distributing into multiple resource providers to ensure availability. Moreover, key-insulated symmetric cryptography [8] is presented to against the compromise of keys from software-based attack such as malware.…”
Section: Related Workmentioning
confidence: 99%
“…Although, there are some researchs using the threshold cryptography to provide security for key stored on cloud [10][11][12][13][14], there are no researches attempting to find a suitable threshold for any number of shares distributed. The objective of this paper is, therefore to design and implement a method that is able to assist in finding such values.…”
Section: Introductionmentioning
confidence: 99%
“…Communication model of the proposed scheme somehow matches with [5], [7] but proposed scheme is more secure and take care both type of problems namely, data splitting and key shares in smart manner to provide better security. In this paper the proposed scheme keeps data and keys at different clouds and treat them differently.…”
Section: Related Workmentioning
confidence: 99%
“…The scheme proposed in [5] used Shamir sharing algorithm with Chinese remainder theorem which distribute the key shares among participant resource providers but scheme proposed in [5] has no provision of managing data.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation