Learn More
Protocols for secure archival storage are becoming increasingly important as the use of digital storage for sensitive documents is gaining wider practice. In [8], Wong et al. combined verifiable secret sharing with proactive secret sharing without reconstruction and proposed a verifiable secret redistribution protocol for long term storage. However, their(More)
Existing protocols for archival systems make use of verifiability of shares in conjunction with a proactive secret sharing scheme to achieve high availability and long term confidentiality, besides data integrity. In this paper, we extend an existing protocol (Wong et al. [2002]) to take care of more realistic situations. For example, it is assumed in the(More)
A narrative is a brief summary of specific events experienced by patients, during the course of a clinical trial. Narrative writing involves multiple activities such as generation of patient profiles, review of data sources, and identification of events for which narratives are required. A sponsor outsources narrative writing activities to leverage the(More)
  • 1