An unconditionally secure multi-round revocation scheme using secret sharing

被引:0
|
作者
Yang, M [1 ]
机构
[1] PLA Univ Sci & Technol, Dept Comp Sci, Nanjing 210007, Peoples R China
关键词
broadcast encryption; revocation scheme; secret sharing; secure multicast;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The revocation schemes are usually used for broadcast encryption and multicast key management. We present a Shamir's polynomial secret sharing based revocation scheme that enable many revocation rounds and has t(2) revocation capability in each round, where t is the degree of the secret sharing polynomial. Our scheme has some notable properties as compared with the other precious schemes: (1) Our multi-round revocation scheme is unconditionally secure other than computationally secure; (2) Our scheme promotes the revocation capability from t users to t2 users in every round. The property can lower the degree of the secret sharing polynomial, which helps to reduce the communications overhead and the cost of the computations. (3) Our scheme is secure against any coalition of all the revoked users. In addition, our scheme also keeps the properties of the other revocation using secret sharing: O(l) personal keys storage, the communication overhead and the cost of the computation are independent of the size of the group.
引用
收藏
页码:31 / 37
页数:7
相关论文
共 50 条
  • [1] An unconditionally secure multi-round revocation scheme using secret sharing
    Yang, Ming
    [J]. TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, 2006, : 630 - 635
  • [2] Unconditionally secure social secret sharing scheme
    Nojoumian, M.
    Stinson, D. R.
    Grainger, M.
    [J]. IET INFORMATION SECURITY, 2010, 4 (04) : 202 - 211
  • [3] A secure multi-round electronic auction scheme
    Liu, SL
    Wang, CJ
    Wang, YM
    [J]. IEEE/AFCEA EUROCOMM 2000, CONFERENCE RECORD: INFORMATION SYSTEMS FOR ENHANCED PUBLIC SAFETY AND SECURITY, 2000, : 330 - 334
  • [4] UNCONDITIONALLY SECURE FAIR (t, n)-SECRET SHARING SCHEME
    Al Mahmoud, Qassim
    Besoul, Khaldoun
    Alhalaybeh, Ayman
    [J]. ADVANCES AND APPLICATIONS IN DISCRETE MATHEMATICS, 2023, 38 (01): : 127 - 143
  • [5] Unconditionally secure proactive secret sharing scheme with combinatorial structures
    Stinson, DR
    Wei, R
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, PROCEEDINGS, 2000, 1758 : 200 - 214
  • [6] Key management for secure multicast communication using secret sharing-based revocation scheme
    Liu, XX
    Yang, M
    Wang, XK
    [J]. INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2005, VOLS 1 AND 2, PROCEEDINGS, 2005, : 1262 - 1266
  • [7] Providing Anonymity in Unconditionally Secure Secret Sharing Schemes
    Mida Guillermo
    Keith M. Martin
    Christine M. O'Keefe
    [J]. Designs, Codes and Cryptography, 2003, 28 : 227 - 245
  • [8] Providing anonymity in unconditionally secure secret sharing schemes
    Guillermo, M
    Martin, KM
    O'Keefe, CM
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2003, 28 (03) : 227 - 245
  • [9] SSeCloud: Using secret sharing scheme to secure keys
    Hu, Liang
    Huang, Yang
    Yang, Disheng
    Zhang, Yuzhen
    Liu, Hengchang
    [J]. 2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, ENERGY TECHNOLOGY AND ENVIRONMENTAL ENGINEERING (MSETEE 2017), 2017, 81
  • [10] Resource Sharing Through Multi-Round Matchings
    Trabelsi, Yohai
    Adiga, Abhijin
    Kraus, Sarit
    Ravi, S. S.
    Rosenkrantz, Daniel J.
    [J]. THIRTY-SEVENTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 37 NO 10, 2023, : 11681 - 11690