A new multi-stage secret sharing scheme using one-way function

被引:31
|
作者
Chang, Ting-Yi [2 ]
Hwang, Min-Shiang [1 ]
Yang, Wei-Pang [2 ]
机构
[1] Department of Management Information System, National Chung Hsing University, 250 Kuo Kuang Road, 402 Taichung, Taiwan
[2] Department of Computer Science, National Chiao Tung University, 1001 Ta Hsueh Road, Hsinchu, Taiwan
来源
Operating Systems Review (ACM) | 2005年 / 39卷 / 01期
关键词
Computational complexity - Computational methods - Cryptography - Security of data;
D O I
10.1145/1044552.1044557
中图分类号
学科分类号
摘要
He and Dawson proposed a multi-stage secret sharing scheme based on one-way function. In that scheme, many secrets are reconstructed stage-by-stage in the dealer's predetermined order, and only one secret shadow is kept by every participant. When all the secrets have been reconstructed, the dealer needs not redistribute fresh shadows to every participant. Later, Harn further improved the He-Dawson scheme to reduce the total number of public values. However, in this paper, we will show that both the He-Dawson scheme and Ham's scheme are one-time-use schemes and that many secrets cannot in fact be reconstructed stage-by-stage. At the same time, we shall also modify the He-Dawson scheme to improve the drawbacks above and show the improved scheme can be applied.
引用
收藏
页码:48 / 55
相关论文
共 50 条
  • [21] A Multi-Stage Optimisation Approach to Design Relocation Strategies in One-Way Car-Sharing Systems With Stackable Cars
    Iacobucci, Riccardo
    Bruno, Raffaele
    Boldrini, Chiara
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (10) : 17048 - 17061
  • [22] AUTHENTICATED ENCRYPTION SCHEME WITHOUT USING A ONE-WAY FUNCTION
    LEE, WB
    CHANG, CC
    ELECTRONICS LETTERS, 1995, 31 (19) : 1656 - 1657
  • [23] A one-way sharing
    Mars-Jones, Adam
    TLS-THE TIMES LITERARY SUPPLEMENT, 2016, (5928): : 22 - 22
  • [24] Memory Leakage-resilient Multi-stage Secret Sharing Scheme with General Access Structures
    Song Y.
    Li Z.-H.
    Wang W.-H.
    Ruan Jian Xue Bao/Journal of Software, 2022, 33 (10): : 3891 - 3902
  • [25] Provably secure verifiable multi-stage secret sharing scheme based on monotone span program
    Mashhadi, Samaneh
    Dehkordi, Massoud Hadian
    Kiamari, Niloofar
    IET INFORMATION SECURITY, 2017, 11 (06) : 326 - 331
  • [27] Multi-Factor One-Way Authentication and Key Retrieval Based on Ideal Threshold Secret Sharing
    Shenets, N.
    NONLINEAR PHENOMENA IN COMPLEX SYSTEMS, 2020, 23 (01): : 54 - 65
  • [28] A MAC AND ONE-WAY FUNCTION BASED FILTERING SCHEME
    Zhao Jing-Guo
    Luo Qing-Yun
    Liu Zhi-Xiong
    INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2015, 8 (04) : 2247 - 2266
  • [29] Convertible authenticated encryption scheme without using conventional one-way function
    Chien, HY
    INFORMATICA, 2003, 14 (04) : 445 - 454
  • [30] An anti-cheat reputation storage scheme based on RSA threshold secret sharing and one-way function in P2P networks
    Sun, Hua
    Yu, Hui-Qun
    Yang, Nian-Hua
    Li, Li
    2011 INTERNATIONAL CONFERENCE ON COMPUTER, ELECTRICAL, AND SYSTEMS SCIENCES, AND ENGINEERING (CESSE 2011), 2011, : 485 - +