Cyber Attack Detection using Secret Sharing Schemes

被引:0
|
作者
Chum, Chi Sing [1 ]
Wei, Xinzhou [2 ]
Zhang, Xiaowen [3 ]
机构
[1] CUNY, Comp Sci Dept, Grad Ctr, New York, NY 10016 USA
[2] CUNY, Elect & Telecommun Dept, New York City Coll Technol, Brooklyn, NY USA
[3] CUNY, Comp Sci Dept, Coll Staten Isl, Staten Isl, NY USA
关键词
cyber attack detection; secret sharing schemes; multifactor authentication; implementation algorithm;
D O I
10.1109/BigDataSecurity-HPSC-IDS58521.2023.00020
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We propose a model along with its algorithm, which can detect suspicious activities and safeguard sensitive information within a complicated infrastructure of an organization based on the secret sharing schemes. The model provides a flexible multifactor authentication methodology to increase the overall security of the system.
引用
收藏
页码:57 / 59
页数:3
相关论文
共 50 条
  • [2] On secret sharing schemes
    Blundo, C
    De Santis, A
    Vaccaro, U
    [J]. INFORMATION PROCESSING LETTERS, 1998, 65 (01) : 25 - 32
  • [3] Detection of Cheaters in Vector Space Secret Sharing Schemes
    Carles Padro
    Germán Sáez
    Jorge Luis Villar
    [J]. Designs, Codes and Cryptography, 1999, 16 : 75 - 85
  • [4] Generation of key predistribution schemes using secret sharing schemes
    Sáez, G
    [J]. DISCRETE APPLIED MATHEMATICS, 2003, 128 (01) : 239 - 249
  • [5] CHEATING DETECTION AND CHEATER IDENTIFICATION IN SECRET SHARING SCHEMES
    WU, TC
    WU, TS
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1995, 142 (05): : 367 - 369
  • [6] Detection of Cheaters in Vector Space Secret Sharing Schemes
    Padro, Carles
    Saez, German
    Villar, Jorge Luis
    [J]. Designs, Codes, and Cryptography, 16 (01): : 75 - 85
  • [7] Detection of cheaters in vector space secret sharing schemes
    Padró, C
    Sáez, G
    Villar, JL
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 1999, 16 (01) : 75 - 85
  • [8] On secret reconstruction in secret sharing schemes
    Wang, Huaxiong
    Wong, Duncan S.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (01) : 473 - 480
  • [9] Secret sharing schemes with detection of cheaters for a general access structure
    Cabello, S
    Padró, C
    Sáez, G
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2002, 25 (02) : 175 - 188
  • [10] Secret sharing schemes with detection of cheaters for a general access structure
    Cabello, S
    Padró, C
    Sáez, G
    [J]. FUNDAMENTALS OF COMPUTATION THEORY, 1999, 1684 : 185 - 194