Secret-Shared Shuffle with Malicious Security.
Xiangfu SongDong YinJianli BaiChangyu DongEe-Chien ChangPublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- information security
- security requirements
- malicious attacks
- access control
- malicious activities
- malicious users
- security level
- network security
- computer security
- intrusion detection
- security issues
- secret key
- security management
- security problems
- insider attacks
- secret sharing
- security mechanisms
- security policies
- malware detection
- security systems
- secret sharing scheme
- key management
- malicious nodes
- information systems