-
Linear complementary dual code-based Multi-secret sharing scheme
Authors:
Haradhan Ghosh,
Sanjit Bhowmick,
Pramod Kumar Maurya,
Satya Bagchi
Abstract:
Hiding a secret is needed in many situations. Secret sharing plays an important role in protecting information from getting lost, stolen, or destroyed and has been applicable in recent years. A secret sharing scheme is a cryptographic protocol in which a dealer divides the secret into several pieces of share and one share is given to each participant. To recover the secret, the dealer requires a s…
▽ More
Hiding a secret is needed in many situations. Secret sharing plays an important role in protecting information from getting lost, stolen, or destroyed and has been applicable in recent years. A secret sharing scheme is a cryptographic protocol in which a dealer divides the secret into several pieces of share and one share is given to each participant. To recover the secret, the dealer requires a subset of participants called access structure. In this paper, we present a multi-secret sharing scheme over a local ring based on linear complementary dual codes using Blakley's method. We take a large secret space over a local ring that is greater than other code-based schemes and obtain a perfect and almost ideal scheme.
△ Less
Submitted 10 December, 2021;
originally announced December 2021.
-
A Survey of Performance Optimization in Neural Network-Based Video Analytics Systems
Authors:
Nada Ibrahim,
Preeti Maurya,
Omid Jafari,
Parth Nagarkar
Abstract:
Video analytics systems perform automatic events, movements, and actions recognition in a video and make it possible to execute queries on the video. As a result of a large number of video data that need to be processed, optimizing the performance of video analytics systems has become an important research topic. Neural networks are the state-of-the-art for performing video analytics tasks such as…
▽ More
Video analytics systems perform automatic events, movements, and actions recognition in a video and make it possible to execute queries on the video. As a result of a large number of video data that need to be processed, optimizing the performance of video analytics systems has become an important research topic. Neural networks are the state-of-the-art for performing video analytics tasks such as video annotation and object detection. Prior survey papers consider application-specific video analytics techniques that improve accuracy of the results; however, in this survey paper, we provide a review of the techniques that focus on optimizing the performance of Neural Network-Based Video Analytics Systems.
△ Less
Submitted 10 May, 2021;
originally announced May 2021.
-
A Survey on Locality Sensitive Hashing Algorithms and their Applications
Authors:
Omid Jafari,
Preeti Maurya,
Parth Nagarkar,
Khandker Mushfiqul Islam,
Chidambaram Crushev
Abstract:
Finding nearest neighbors in high-dimensional spaces is a fundamental operation in many diverse application domains. Locality Sensitive Hashing (LSH) is one of the most popular techniques for finding approximate nearest neighbor searches in high-dimensional spaces. The main benefits of LSH are its sub-linear query performance and theoretical guarantees on the query accuracy. In this survey paper,…
▽ More
Finding nearest neighbors in high-dimensional spaces is a fundamental operation in many diverse application domains. Locality Sensitive Hashing (LSH) is one of the most popular techniques for finding approximate nearest neighbor searches in high-dimensional spaces. The main benefits of LSH are its sub-linear query performance and theoretical guarantees on the query accuracy. In this survey paper, we provide a review of state-of-the-art LSH and Distributed LSH techniques. Most importantly, unlike any other prior survey, we present how Locality Sensitive Hashing is utilized in different application domains.
△ Less
Submitted 17 February, 2021;
originally announced February 2021.
-
Cyclic group based mutual authentication protocol for RFID system
Authors:
Pramod Kumar Maurya,
Satya Bagchi
Abstract:
Widespread deployment of RFID system arises security and privacy concerns of users. There are several proposals are in the literature to avoid these concerns, but most of them provides reasonable privacy at the cost of search complexity on the server side. The search complexity increases linearly with the number of tags in the system. Some schemes use a group based approach to solve the search com…
▽ More
Widespread deployment of RFID system arises security and privacy concerns of users. There are several proposals are in the literature to avoid these concerns, but most of them provides reasonable privacy at the cost of search complexity on the server side. The search complexity increases linearly with the number of tags in the system. Some schemes use a group based approach to solve the search complexity problem. In this paper, we proposed a group based authentication protocol for RFID system which is based on some characteristics of cyclic groups. The scheme uses only bitwise XOR and mod operation for the computational work. Also, the scheme does not use any pseudo-number generator on the tag-side. We use two benchmark metric based on anonymity set to measure the privacy level of the system when some tags are compromised by an adversary. We present some simulation results which show that the scheme preserves high level of privacy and discloses very less amount of information when some tags are compromised. Furthermore, it's formal and informal analysis shows that our scheme preserves information privacy as well as un-traceability and also withstand against various well known attacks.
△ Less
Submitted 31 December, 2017;
originally announced January 2018.
-
Generalized twisted centralizer codes
Authors:
Joydeb Pal,
Pramod Kumar Maurya,
Shyambhu Mukherjee,
Satya Bagchi
Abstract:
An important code of length $n^2$ is obtained by taking centralizer of a square matrix over a finite field $\mathbb{F}_q$. Twisted centralizer codes, twisted by an element $a \in \mathbb{F}_q$, are also similar type of codes but different in nature. The main results were embedded on dimension and minimum distance. In this paper, we have defined a new family of twisted centralizer codes namely gene…
▽ More
An important code of length $n^2$ is obtained by taking centralizer of a square matrix over a finite field $\mathbb{F}_q$. Twisted centralizer codes, twisted by an element $a \in \mathbb{F}_q$, are also similar type of codes but different in nature. The main results were embedded on dimension and minimum distance. In this paper, we have defined a new family of twisted centralizer codes namely generalized twisted centralizer (GTC) codes by $\mathcal{C}(A,D):= \lbrace B \in \mathbb{F}_q^{n \times n}|AB=BAD \rbrace$ twisted by a matrix $D$ and investigated results on dimension and minimum distance. Parity-check matrix and syndromes are also investigated. Length of the centralizer codes is $n^2$ by construction but in this paper, we have constructed centralizer codes of length $(n^2-i)$, where $i$ is a positive integer. In twisted centralizer codes, minimum distance can be at most $n$ when the field is binary whereas GTC codes can be constructed with minimum distance more than $n$.
△ Less
Submitted 7 September, 2017; v1 submitted 6 September, 2017;
originally announced September 2017.