Access control and signatures via quorum secret sharing

被引:43
|
作者
Naor, M [1 ]
Wool, A
机构
[1] Weizmann Inst Sci, Dept Appl Math & Comp Sci, IL-76100 Rehovot, Israel
[2] Lucent Technol, Bell Labs, Murray Hill, NJ 07974 USA
基金
以色列科学基金会;
关键词
quorum systems; replication; secret sharing; security; cryptography;
D O I
10.1109/71.722223
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We suggest a method of controlling the access to a secure database via quorum systems. A quorum system is a collection of sets (quorums) every two of which have a nonempty intersection. Quorum systems have been used for a number of applications in the area of distributed systems. We propose a separation between access servers, which are protected and trustworthy, but may be outdated, and the data servers, which may all be compromised. The main paradigm is that only the servers in a complete quorum can collectively grant (or revoke) access permission. The method we suggest ensures that, after authorization is revoked, a cheating user Alice will not be able to access the data even if many access servers still consider her authorized and even if the complete raw database is available to her. The method has a low overhead in terms of communication and computation. It can also be converted into a distributed system for issuing secure signatures. An important building block in our method is the use of secret sharing schemes that realize the access structures of quorum systems. We provide several efficient constructions of such schemes which may be of interest in their own right.
引用
收藏
页码:909 / 922
页数:14
相关论文
共 50 条
  • [41] A perfect secret sharing scheme for general access structures
    Jia, Xingxing
    Guo, Yusheng
    Luo, Xiangyang
    Wang, Daoshun
    Zhang, Chaoyang
    INFORMATION SCIENCES, 2022, 595 : 54 - 69
  • [42] Probabilistic Secret Sharing Schemes for Multipartite Access Structures
    Wang, Xianfang
    Fu, Fang-Wei
    Guang, Xuan
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (04) : 856 - 862
  • [43] Multiple secret image sharing with general access structure
    Tzung-Her Chen
    Xi-Wen Wu
    Multimedia Tools and Applications, 2020, 79 : 13247 - 13265
  • [44] Ideal secret sharing schemes with multipartite access structures
    Ng, SL
    IEE PROCEEDINGS-COMMUNICATIONS, 2006, 153 (02): : 165 - 168
  • [45] Identity-based Secret Sharing Access Control Framework for Information-Centric Networking
    Deng, Lianglang
    Luo, Jiangtao
    Zhou, Jie
    Wang, Junxia
    2020 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2020, : 507 - 511
  • [46] Secret Sharing via Noisy Broadcast Channels
    Lai, Lifeng
    Liang, Yingbin
    Du, Wenliang
    Shamai, Shlomo
    2011 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2011,
  • [47] Quantum Secret Sharing via Cavity QED
    Lu Yin-Ju
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (10) : 3324 - 3328
  • [48] Quantum Secret Sharing via Cavity QED
    Lu Yin-Ju
    International Journal of Theoretical Physics, 2020, 59 : 3324 - 3328
  • [49] Secret Key Generation via a Modified Quantum Secret Sharing Protocol
    Smith, A. M.
    Evans, P. G.
    lawrie, B.
    Legre, M.
    Lougovski, P.
    Ray, W.
    Williams, B. P.
    Qi, B.
    Grice, W. P.
    QUANTUM INFORMATION AND COMPUTATION XIII, 2015, 9500
  • [50] Quorum and non-quorum based hierarchical multi-authority access control scheme for secure data sharing in cloud based environment
    Parte, Smita Athanere
    Thakur, Ramesh
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2024, 49 (03):