The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this short note, we give a self-contained proof of equivalence between the search and decision versions of the Learning with Error Problem over Rings problem (Lyuba-shevsky, Peikert, Regev 2010) for spherical noise distributions.
The two most recent PVSS (publicly verifiable secret sharing) schemes are illustrated to be vulnerable to a simple attack. Moreover, one of them has to deteriorate its efficiency greatly to meet practical security requirement. The attack makes the share holders to receive incorrect shares, which will lead secret reconstruction to mistake. The efficiency deterioration is so serious that no practical...
Making new connections according to personal preferences is a crucial service in mobile social networking, where the initiating user can find matching users within physical proximity of him/her. In existing systems for such services, usually all the users directly publish their complete profiles for others to search. However, in many applications, the users' personal profiles may contain sensitive...
Secret image sharing is a sharing method to transmit and store images with fault tolerance property. The paper proposes a recursive method to extend conventional secret image sharing more general in application which is named multi-layer secret image sharing. It enables users more controllability to secret images than conventional secret image sharing. Moreover, a useful application is also introduced...
The focus of this paper is to design a dependable ID-based threshold broadcast encryption (TBE) scheme, by which a center can distribute keys over a network, so that a privileged subset of users can collaborate to jointly compute a specific key. Then a conventional secret-key cryptosystem, such as AES, can be used to encrypt the subsequent broadcast with the distributed key. Because a key distribution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.