The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Truthful spectrum auction is believed to be an effective method for spectrum redistribution. However, privacy concerns have largely hampered the practical applications of truthful spectrum auctions. In this paper, to make the applications of double spectrum auctions practical, we present a secure, efficient and practical double spectrum auction design, SDSA. Specifically, by combining three security...
The emergence of 5G networks will allow cloud computing providers to offer more convenient services. However, security and privacy issues of cloud services in 5G networks represent huge challenges. Recently, to improve security and privacy, a novel primitive was proposed by Ma et al. in TIFS 2015, called public key encryption with equality test supporting flexible authorization (PKEET-FA). However,...
Techniques used in text steganography are more difficult to develop, since there is less redundancy in text than other media, such as image, video and audio. A text hiding method using multiple-base encoding is proposed. The occurrence number of each word is counted and sorted in descending order, which is set as a base in the multiple-base notation system. Those unrepeated words are treated as a...
Multi-Authority Attribute-Based Encryption is a promising cryptographic technique for realizing fine-grained access control on the encrypted data in cloud computing. However, existing multi-authority based attribute encryption schemes in cloud computing generally do not take into account the attribute with weight. In this paper, the concept of weight is introduced into multi-authority based attribute...
The rapid development of the Internet and the progress of network facilities, cloud database services are very popular with the web users, which allows users to retrieve, update and delete the records of the cloud database. However, these users of such services do not always trust the cloud storage provider to keep their privacy. Therefore, neither the user's database information nor the access pattern...
The booming of the Internet and its applications, especially, the recent trend in outsourcing databases, fuels the research on symmetrically private information retrieval (SPIR) schemes. In this paper, we propose a fully homomorphic encryption based SPIR scheme in order to further improve the comm-unication cost of SPIR from O((logn)²) to O(logn). Actually, our schemes can be directly used to implement...
This paper introduces a new (t, n) secret sharing scheme for image encryption. The proposed method encrypts the secret image into two images as the same size of the original image, which one is the public image (called the encrypted image) and another is to be shared among n participants using a new secret sharing method based on the Shamir’s secret sharing. In the new secret sharing scheme, t (or...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.