A secret sharing scheme with general access structures and its applications

被引:0
|
作者
Sang Y. [1 ]
Zeng J. [2 ]
Li Z. [3 ]
You L. [1 ]
机构
[1] School of Telecommunication Engineering, Hangzhou Dianzi University
[2] School of Mathematical Sciences, Xiamen University
[3] Information science and technology college, Chengdu University
关键词
Bilinear pairings; Key issuing protocol; Long term key pair; Secret sharing;
D O I
10.4156/ijact.vol3.issue4.13
中图分类号
学科分类号
摘要
A new secret sharing scheme with general access structures was constructed, which works under certificateless scenarios. This secret sharing scheme can also be realized under PKI or ID-based scenarios. In this scheme, the dealer need not send any secret information to participants. The shared secret, the participant set and the access structure can be changed dynamically without updating any participant's long term key pair and secret shadow. The degree of the used Lagrange interpolation polynomial is only one, which makes the computational complexity of the proposed scheme very low. The proposed scheme has advantages over the existing schemes and thus provides great capabilities for many applications. We also gave an application instance of the secret sharing schemecertificateless multi-KGC key issuing protocol.
引用
下载
收藏
页码:121 / 128
页数:7
相关论文
共 50 条
  • [41] Timed-Release Computational Secret Sharing Scheme and Its Applications
    Watanabe, Yohei
    Shikata, Junji
    PROVABLE SECURITY, PROVSEC 2014, 2014, 8782 : 326 - 333
  • [42] A Novel General Dynamic Secret Sharing Scheme
    Jin, Yuxing
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON RESOURCE ENVIRONMENT AND INFORMATION TECHNOLOGY IN 2010 (REIT' 2010), 2010, : 556 - 558
  • [43] Quantum Optimal Multiple Assignment Scheme for Realizing General Access Structure of Secret Sharing
    Matsumoto, Ryutaroh
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (02): : 726 - 728
  • [44] An Efficient and Secure Multi-Secret Image Sharing Scheme with General Access Structure
    Lee, Ching-Fan
    Juan, Justie Su-Tzu
    2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, : 253 - 259
  • [45] Realizing secret sharing with general access structure
    Harn, Lein
    Hsu, Chingfang
    Zhang, Mingwu
    He, Tingting
    Zhang, Maoyuan
    INFORMATION SCIENCES, 2016, 367 : 209 - 220
  • [46] Multi-Use Multi-Secret Sharing Scheme for General Access Structure
    Roy, Partha Sarathi
    Adhikari, Avishek
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (04): : 50 - 57
  • [47] Access structures of elliptic secret sharing schemes
    Chen, Hao
    Ling, San
    Xing, Chaoping
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (02) : 850 - 852
  • [48] Efficient secret sharing with access structures in a hierarchy
    Lin, CH
    Lee, W
    AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, 2005, : 123 - 126
  • [49] Improved secret sharing with access structures in a hierarchy
    Liu, Yi
    Zhang, Ling
    Wang, Yumin
    APSCC: 2006 IEEE ASIA-PACIFIC CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, 2006, : 18 - +
  • [50] Secret sharing schemes with nice access structures
    Ding, Cunsheng
    Salomaa, Arto
    FUNDAMENTA INFORMATICAE, 2006, 73 (1-2) : 51 - 62