Optimal uniform secret sharing

M Yoshida, T Fujiwara… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
An important problem in secret sharing schemes is minimizing the share size. For (k, n)-threshold
schemes and (k, L, n)-ramp schemes, constructions that minimize the share size are …

Equivalence of non-perfect secret sharing and symmetric private information retrieval with general access structure

S Song, M Hayashi - IEEE Journal on Selected Areas in …, 2022 - ieeexplore.ieee.org
We study the equivalence between non-perfect secret sharing (NSS) and symmetric private
information retrieval (SPIR) with arbitrary response and collusion patterns. NSS and SPIR …

Strong security of linear ramp secret sharing schemes with general access structures

R Eriguchi, N Kunihiro - Information Processing Letters, 2020 - Elsevier
A secret sharing scheme is a cryptographic technique to protect a secret from loss and leakage
by dividing it into shares. A ramp secret sharing scheme can improve efficiency in terms …

Secure distributed storage: Optimal trade-off between storage rate and privacy leakage

RA Chou, J Kliewer - IEEE Transactions on Information Theory, 2024 - ieeexplore.ieee.org
Consider the problem of storing data in a distributed manner over T servers. Specifically, the
data needs to (i) be recoverable from any τ servers, and (ii) remain private from any z …

Improved storage capacity for health care center using ant lion-ramp secret sharing scheme for data deduplication in cloud computing

G Neelamegam, P Marikkannu - Journal of Intelligent & Fuzzy …, 2022 - content.iospress.com
The Cloud-based storage is able to store more information in gigabyte size in all formats such
as text, image or video and it can access at any time with their login credentials. In such a …

Quantifying the cost of privately storing data in distributed storage systems

RA Chou - IEEE Transactions on Information Theory, 2022 - ieeexplore.ieee.org
Consider a user who wishes to store a file in multiple servers such that at least $t$ servers
are needed to reconstruct the file, and $z$ colluding servers cannot learn any information …

Secure distributed storage: Rate-privacy trade-off and XOR-based coding scheme

RA Chou, J Kliewer - 2020 IEEE International Symposium on …, 2020 - ieeexplore.ieee.org
We consider the problem of storing data in a distributed manner over T servers. We require
the data (i) to be recoverable from the T servers, and (ii) to remain private from any T -1 …

Towards Secure Computation and Learning From Symmetric Private Information Retrieval

Z Wang - 2023 - search.proquest.com
This dissertation focuses on secure computation and learning from the perspective of
information-theoretic symmetric private information retrieval (SPIR). Private information retrieval (…