An updatable XOR secret sharing scheme

被引:0
|
作者
Lv, Chunli [1 ]
Zeng, Zichuan [1 ]
Zhang, Bo [1 ]
Shen, Changhong [2 ]
Pei, Bei [3 ]
机构
[1] College of Information and Electrical Engineering, China Agricultural University, Beijing,100083, China
[2] School of Computer Science & Technology, Beijing Institute of Technology, Beijing,100081, China
[3] Third Institute of Public Security, Shanghai,200031, China
来源
International Agricultural Engineering Journal | 2019年 / 28卷 / 01期
关键词
Digital storage;
D O I
暂无
中图分类号
学科分类号
摘要
The secret sharing scheme for large data scattered storage needs to solve two problems: one is the confidentiality problem in long storage, that is, to prevent the external adversaries from stealing secrets; second is for a large number of data sharing and updating operations including secret sharing and refactoring efficiency, and the amount of traffic and efficiency during updating. The existing secret sharing scheme cannot solve the above problems at the same time. To fill the research gap, an active secret sharing algorithm for updates was designed based on the exclusive or secret scheme of Lv and pseudo random sequence, which has the following advantages: first of all, it is worth emphasizing that update is the unpredictable operation. One is that each participant completes their share updating automatically with the premise of ensuring the credibility. The other is updating some quota blocks randomly under the premise of blocking. Secondly, the unpredictable updating operation can effectively prevent opponents from speculating the updated law. Last but not least, it is suitable for the storage area. © 2019, Asian Association for Agricultural Engineering. All rights reserved.
引用
收藏
页码:354 / 358
相关论文
共 50 条
  • [21] Secret Sharing Scheme: Vector Space Secret Sharing and φ Function
    Atici, Mustafa
    2012 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2012, : 914 - 918
  • [22] A Compact Secret Image Sharing Scheme Based on Flexible Secret Matrix Sharing Scheme
    Wang, Lingfu
    Wang, Jing
    Zhang, Mingwu
    Huang, Weijia
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT III, 2022, 13157 : 411 - 431
  • [23] General secret sharing scheme
    Tan, KJ
    Zhu, HW
    COMPUTER COMMUNICATIONS, 1999, 22 (08) : 755 - 757
  • [24] A generalized secret sharing scheme
    Chang, CC
    Tsai, HM
    JOURNAL OF SYSTEMS AND SOFTWARE, 1997, 36 (03) : 267 - 272
  • [25] Secret Sharing Scheme with Reversing
    Mishra, Abhishek
    Gupta, Ashutosh
    2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 370 - 373
  • [26] Secret Sharing Scheme with Fairness
    Tian, Youliang
    Ma, Jianfeng
    Peng, Changgen
    Zhu, Jianming
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 494 - 500
  • [27] A Compression Scheme of Secret Sharing
    Yamasaki, Shoichiro
    Matsushima, Tomoko K.
    2013 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATIONS SYSTEMS (ISPACS), 2013, : 351 - 356
  • [28] Generalized secret sharing scheme
    Natl Chung Cheng Univ, Chiayi, Taiwan
    J Syst Software, 3 (267-272):
  • [30] A Construction of Secret Sharing Scheme
    Goh, Y. L.
    Wong, Denis C. K.
    MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES, 2015, 9 : 89 - 101