An updatable XOR secret sharing scheme

被引:0
|
作者
Lv, Chunli [1 ]
Zeng, Zichuan [1 ]
Zhang, Bo [1 ]
Shen, Changhong [2 ]
Pei, Bei [3 ]
机构
[1] College of Information and Electrical Engineering, China Agricultural University, Beijing,100083, China
[2] School of Computer Science & Technology, Beijing Institute of Technology, Beijing,100081, China
[3] Third Institute of Public Security, Shanghai,200031, China
来源
International Agricultural Engineering Journal | 2019年 / 28卷 / 01期
关键词
Digital storage;
D O I
暂无
中图分类号
学科分类号
摘要
The secret sharing scheme for large data scattered storage needs to solve two problems: one is the confidentiality problem in long storage, that is, to prevent the external adversaries from stealing secrets; second is for a large number of data sharing and updating operations including secret sharing and refactoring efficiency, and the amount of traffic and efficiency during updating. The existing secret sharing scheme cannot solve the above problems at the same time. To fill the research gap, an active secret sharing algorithm for updates was designed based on the exclusive or secret scheme of Lv and pseudo random sequence, which has the following advantages: first of all, it is worth emphasizing that update is the unpredictable operation. One is that each participant completes their share updating automatically with the premise of ensuring the credibility. The other is updating some quota blocks randomly under the premise of blocking. Secondly, the unpredictable updating operation can effectively prevent opponents from speculating the updated law. Last but not least, it is suitable for the storage area. © 2019, Asian Association for Agricultural Engineering. All rights reserved.
引用
收藏
页码:354 / 358
相关论文
共 50 条
  • [32] A nonlinear secret sharing scheme
    Renvall, A
    Ding, CS
    INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 56 - 66
  • [33] A Resistant Secret Sharing Scheme
    Chang, Chin-Chen
    Chen, Yen-Chang
    Lin, Chia-Chen
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 61 - +
  • [34] An Audio Secret Sharing Using XOR Operations with Scalable Shares
    Chattopadhyay, Arup Kumar
    Nag, Amitava
    Sadhu, Shayak
    Singh, Jyoti Prakash
    TENCON 2017 - 2017 IEEE REGION 10 CONFERENCE, 2017, : 2743 - 2746
  • [35] A Molecular Secret Sharing Scheme
    Lustgarten, Omer
    Carmieli, Raanan
    Motiei, Leila
    Margulies, David
    ANGEWANDTE CHEMIE-INTERNATIONAL EDITION, 2019, 58 (01) : 184 - 188
  • [36] An algebraic interpretation of the XOR-based Secret Sharing Schemes
    Suga, Yuji
    PROCEEDINGS OF 2018 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2018), 2018, : 228 - 231
  • [37] A reversible data hiding algorithm based on probabilistic DNA-XOR secret sharing scheme for color images
    Tuncer, Turker
    Avci, Engin
    DISPLAYS, 2016, 41 : 1 - 8
  • [38] Improvement of Communication Traffic and Security of Proactive Secret Sharing Schemes and Combination Proactive Secret Sharing Scheme with an Asymmetric Secret Sharing Scheme
    Kaneko, Naoto
    Iwamura, Keiichi
    2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017), 2017, : 13 - 18
  • [39] A Lock and Key Share (2, m, n) Random Grid Visual Secret Sharing Scheme with XOR and OR Decryptions
    Ahammed, T. Farzin
    Mundekkattil, Sulaiman
    COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS, ICC3 2015, 2016, 412 : 393 - 402
  • [40] A Secret Sharing Scheme to Recover Secret Unnecessary Calculating
    Wang, Yanbo
    Li, Wanlin
    He, Min
    Yang, Jian
    Chen, Liang
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (03): : 1327 - 1330