Pairing-Based Dynamic Threshold Secret Sharing Scheme

被引:0
|
作者
Huang, Ye [1 ]
Yang, Geng [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing, Jiangsu, Peoples R China
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose the PBDT, a novel secret sharing scheme which outperforms current constructions in the distributed wireless network environment. In our scheme, each participant selects his secret share respectively without negotiating with a central node. One secret share can extract several messages without renewing when new participants are added or old participants are deleted. And its share verification phase allows any participant to verify its authenticity and validity. PBDT proves to be practically efficient and computationally secure to resist collision attack, especially for distributed wireless networks.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] A PAIRING-BASED PUBLICLY VERIFIABLE SECRET SHARING SCHEME
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    [J]. JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2011, 24 (01) : 186 - 194
  • [2] A pairing-based publicly verifiable secret sharing scheme
    Tsu-Yang Wu
    Yuh-Min Tseng
    [J]. Journal of Systems Science and Complexity, 2011, 24 : 186 - 194
  • [3] Dynamic threshold secret sharing scheme
    Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China
    [J]. Qinghua Daxue Xuebao, 2006, 1 (102-105):
  • [4] Cluster space key management scheme based on threshold secret sharing and bilinear pairing
    Tong, Xiaojun
    Liu, Jie
    Wang, Zhu
    Zhang, Miao
    Chen, Hong
    Ma, Jing
    [J]. INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 2021, 39 (06) : 686 - 704
  • [5] Security Analysis and Improvement of Pairing-Based Threshold Proxy Signature Scheme
    Wang, Chao
    Hang, Yunpeng
    Li, Fagen
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 64 - +
  • [6] Efficient pairing-based threshold proxy signature scheme with. known signers
    Qian, HF
    Cao, ZF
    Xue, QS
    [J]. INFORMATICA, 2005, 16 (02) : 261 - 274
  • [7] A (t, n)-FAIR DYNAMIC THRESHOLD SECRET SHARING SCHEME
    Lin, Tzuoh-Yi
    Wu, Tzong-Chen
    Lee, Chin-I
    Wu, Tzong-Sun
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (05): : 1395 - 1406
  • [8] A Secret Sharing Scheme of Dynamic Threshold with Cheaters Detection and Identification
    He, Yong-Zhong
    Xu, Xue-Jiao
    Wang, Dao-Shun
    Li, Shun-Dong
    Zhao, Xiang-Hui
    Yang, Ching-Nung
    [J]. SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 638 - 649
  • [9] Dynamic threshold and cheater resistance for Shamir secret sharing scheme
    Tartary, Christophe
    Wang, Huaxiong
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 103 - 117
  • [10] A verifiable rational secret sharing scheme based on bilinear pairing
    [J]. Zhang, E. (zhangenzdrj@163.com), 1600, Chinese Institute of Electronics (40):