Pairing-Based Dynamic Threshold Secret Sharing Scheme

被引:0
|
作者
Huang, Ye [1 ]
Yang, Geng [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing, Jiangsu, Peoples R China
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose the PBDT, a novel secret sharing scheme which outperforms current constructions in the distributed wireless network environment. In our scheme, each participant selects his secret share respectively without negotiating with a central node. One secret share can extract several messages without renewing when new participants are added or old participants are deleted. And its share verification phase allows any participant to verify its authenticity and validity. PBDT proves to be practically efficient and computationally secure to resist collision attack, especially for distributed wireless networks.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] A verifiable (k, n)-threshold dynamic quantum secret sharing scheme
    Li, Fulin
    Hu, Hang
    Zhu, Shixin
    Yan, Jiayun
    Ding, Jian
    [J]. QUANTUM INFORMATION PROCESSING, 2022, 21 (07)
  • [22] Dynamic threshold changeable multi-policy secret sharing scheme
    Wang, Feng
    Zhou, You-sheng
    Li, Dao-feng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3653 - 3658
  • [23] A New Power Sharing Scheme of Multiple Microgrids and an Iterative Pairing-Based Scheduling Method
    Gao, Hong-Chao
    Choi, Joon-Ho
    Yun, Sang-Yun
    Ahn, Seon-Ju
    [J]. ENERGIES, 2020, 13 (07)
  • [24] Pairing-based Anonymous Boardroom Voting Scheme
    Li, Long-Hai
    Huang, Cheng-Qiang
    Fu, Shao-Feng
    [J]. 2014 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2014, : 264 - 268
  • [25] A Practical Publicly Verifiable Secret Sharing Scheme Based on Bilinear Pairing
    Tian, Youliang
    Peng, Changgen
    Zhang, Renping
    Chen, Yuling
    [J]. 2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 71 - 75
  • [26] An Image Watermarking Scheme using Threshold Based Secret Sharing
    Latha, S. Bhargavi
    Reddy, D. Venkata
    Damodaram, A.
    [J]. 2017 7TH IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2017, : 619 - 623
  • [27] A Novel Connection Correlation Scheme Based on Threshold Secret Sharing
    Chen, Yonghong
    Zhang, Ning
    Tian, Hui
    Wang, Tian
    Cai, Yiqiao
    [J]. IEEE COMMUNICATIONS LETTERS, 2016, 20 (12) : 2414 - 2417
  • [28] Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation
    Zhang, En
    Zhu, Jun-Zhe
    Li, Gong-Li
    Chang, Jian
    Li, Yu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [29] A Threshold Secret Sharing Scheme Based on Cross-Product
    Qu, Juan
    Zhang, Jian-zhong
    [J]. PROCEEDINGS OF 2010 ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION, VOLS 1 AND 2, 2010, : 1015 - 1017
  • [30] A novel threshold changeable secret sharing scheme
    Harn, Lein
    Hsu, Chingfang
    Xia, Zhe
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2022, 16 (01)