Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.

New Research Articles 2020 March Issue International Journal on Cryptography and Information Security (IJCIS)

International Journal on Cryptography and Information Security (IJCIS)

ISSN: 1839 ~ 8626

http://wireilla.com/ijcis/index.html

Current Issue : March 2020, Volume 10, Number 1

An Efficient Threshold Cryptography Scheme for Cloud ERP Data

Arnold Mashud Abukari1, Edem Kwedzo Bankas2 and Mohammed Iddrisu Muniru3, 1Tamale Technical University, Ghana, 2Computer Science Department, University for Development Studies, Ghana and 3Mathematics Department, University for Development Studies, Ghana

https://wireilla.com/ijcis/vol10.html

  • Sé el primero en comentar

  • Sé el primero en recomendar esto

New Research Articles 2020 March Issue International Journal on Cryptography and Information Security (IJCIS)

  1. 1. International Journal on Cryptography and Information Security (IJCIS) ISSN: 1839 ~ 8626 http://wireilla.com/ijcis/index.html Current Issue: March 2020, Volume 10, Number 1 https://wireilla.com/ijcis/vol10.html
  2. 2. Paper -01 AN EFFICIENT THRESHOLD CRYPTOGRAPHY SCHEME FOR CLOUD ERP DATA Arnold Mashud Abukari1 , Edem Kwedzo Bankas2 and Mohammed Iddrisu Muniru3 1 Computer Science Department, Tamale Technical University, Tamale, Ghana 2 Computer Science Department, University for Development Studies, Navrongo, Ghana 3 Mathematics Department, University for Development Studies, Navrongo, Ghana ABSTRACT Cloud ERP is a new concept that has caught the attention of researchers and industry players. One of the major challenges towards migrating ERP data to cloud is security and confidentiality. A number of secret sharing schemes (SSS) have been proposed Mignote, Asmuth-Bloom, Shamir and Blakley but not without challenges. In this research we proposed an efficient threshold cryptography scheme to secure cloud ERP data. We modified the Asmuth-Bloom SSS and applied it to cloud ERP data. KEYWORDS Threshold Cryptography, Secret Sharing Scheme (SSS), CRT, Cloud ERP. For More Details: https://wireilla.com/papers/ijcis/V10N1/10120ijcis01.pdf Volume Link: https://wireilla.com/ijcis/vol10.html
  3. 3. REFERENCES [1] C. Asmuth and J. Bloom, “A modular approach to key safeguarding,” IEEE Transactions on Information Theory, vol. 29, no. 2, pp. 208–210, March 1983. [2] A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, pp. 612–613, Nov. 1979. [Online]. Available: http://doi.acm.org/10.1145/359168.359176 [3] M. Mignotte, “How to share a secret,” in Cryptography, T. Beth, Ed. Berlin, Heidelberg: Springer Berlin Heidelberg, 1983, pp. 371–375. [4] A. De Santis, Y. Desmedt, Y. Frankel, and M. Yung, “How to share a function securely,” in Proceedings of the Twenty-sixth Annual ACM Symposium on Theory of Computing, ser. STOC ’94. New York, NY, USA: ACM, 1994, pp. 522–533. [Online]. Available: http://doi.acm.org/10.1145/195058.195405 [5] H.-F. Huang and C.-C.Chang, “A novel efficient (t, n) threshold proxy signature scheme,” Information sciences, vol. 176, no. 10, pp. 1338–1349, 2006. [6] Y. Desmedt, “Some recent research aspects of threshold cryptography,” in International Workshop on Information Security. Springer, 1997, pp. 158–173. [7] V. Shoup, “Practical threshold signatures,” in International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 2000, pp. 207–220. [8] C. P. Chen and C.-Y. Zhang, “Data-intensive applications, challenges, techniques and technologies: A survey on big data,” Information Sciences, vol. 275, pp. 314–347, 2014. [9] C. Songsheng and Y. Peipei, “Economic benefits of enterprise resources planning (erp)-based on empirical evidence from chinese listed companies,” in Logistics Systems and Intelligent Management, 2010 International Conference on, vol. 3. IEEE, 2010, pp. 1305–1308.

    Sé el primero en comentar

International Journal on Cryptography and Information Security (IJCIS) ISSN: 1839 ~ 8626 http://wireilla.com/ijcis/index.html Current Issue : March 2020, Volume 10, Number 1 An Efficient Threshold Cryptography Scheme for Cloud ERP Data Arnold Mashud Abukari1, Edem Kwedzo Bankas2 and Mohammed Iddrisu Muniru3, 1Tamale Technical University, Ghana, 2Computer Science Department, University for Development Studies, Ghana and 3Mathematics Department, University for Development Studies, Ghana https://wireilla.com/ijcis/vol10.html

Vistas

Total de vistas

8

En Slideshare

0

De embebidos

0

Número de embebidos

1

Acciones

Descargas

0

Compartidos

0

Comentarios

0

Me gusta

0

×