2016 International Conference on Computing, Networking and Communications (ICNC) 2016
DOI: 10.1109/iccnc.2016.7440586
|View full text |Cite
|
Sign up to set email alerts
|

Secure distributed membership tests via secret sharing: How to hide your hostile hosts: Harnessing shamir secret sharing

Abstract: Data security and availability for operational use are frequently seen as conflicting goals. Research on searchable encryption and homomorphic encryption are a start, but they typically build from encryption methods that, at best, provide protections based on problems assumed to be computationally hard. By contrast, data encoding methods such as secret sharing provide information-theoretic data protections. Archives that distribute data using secret sharing can provide data protections that are resilient to ma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
references
References 20 publications
0
0
0
Order By: Relevance