A secret sharing scheme with general access structures and its applications

被引:0
|
作者
Sang Y. [1 ]
Zeng J. [2 ]
Li Z. [3 ]
You L. [1 ]
机构
[1] School of Telecommunication Engineering, Hangzhou Dianzi University
[2] School of Mathematical Sciences, Xiamen University
[3] Information science and technology college, Chengdu University
关键词
Bilinear pairings; Key issuing protocol; Long term key pair; Secret sharing;
D O I
10.4156/ijact.vol3.issue4.13
中图分类号
学科分类号
摘要
A new secret sharing scheme with general access structures was constructed, which works under certificateless scenarios. This secret sharing scheme can also be realized under PKI or ID-based scenarios. In this scheme, the dealer need not send any secret information to participants. The shared secret, the participant set and the access structure can be changed dynamically without updating any participant's long term key pair and secret shadow. The degree of the used Lagrange interpolation polynomial is only one, which makes the computational complexity of the proposed scheme very low. The proposed scheme has advantages over the existing schemes and thus provides great capabilities for many applications. We also gave an application instance of the secret sharing schemecertificateless multi-KGC key issuing protocol.
引用
收藏
页码:121 / 128
页数:7
相关论文
共 50 条
  • [1] A perfect secret sharing scheme for general access structures
    Jia, Xingxing
    Guo, Yusheng
    Luo, Xiangyang
    Wang, Daoshun
    Zhang, Chaoyang
    [J]. INFORMATION SCIENCES, 2022, 595 : 54 - 69
  • [2] A secure and efficient secret sharing scheme with general access structures
    Pang, Liao-Jun
    Li, Hui-Xian
    Wang, Yu-Min
    [J]. FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PROCEEDINGS, 2006, 4223 : 646 - 649
  • [3] Multi-secret sharing scheme with general access structures
    Li, Hui-Xian
    Cheng, Chun-Tian
    Pang, Liao-Jun
    [J]. Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2006, 34 (06): : 95 - 98
  • [4] An Efficient Multi-secret Sharing Scheme with General Access Structures
    Wei Yun
    Zhang Xingkai
    Xiong Guohua
    [J]. ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, : 1246 - 1250
  • [5] A Multi-stage Secret Sharing Scheme with General Access Structures
    Wei Yun
    Zhong Pucha
    Xiong Guohua
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12613 - +
  • [6] A Label Graph Based Verifiable Secret Sharing Scheme for General Access Structures
    Hsu, Ching-Fang
    Zeng, Bing
    Cheng, Qi
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2013, 15 (04) : 407 - 410
  • [7] An Efficient and Secure Multi-Secret Sharing Scheme with General Access Structures
    PANG Liaojun~ 1
    2. School of Computer Science
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1649 - 1652
  • [8] Secret Sharing Schemes with General Access Structures
    Liu, Jian
    Mesnager, Sihem
    Chen, Lusheng
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015, 2016, 9589 : 341 - 360
  • [9] A construction for secret sharing scheme with general access structure
    [J]. Guo, C. (guo8016@gmail.com), 1600, Ubiquitous International (04):
  • [10] Threshold Secret Sharing Scheme for Compartmented Access Structures
    Fathimal, P. Mohamed
    Rani, P. Arockia Jansi
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2016, 10 (03) : 1 - 9