Shamir Secret Sharing Scheme with Dynamic Access Structure (SSSDAS): case study on nuclear power plant

被引:2
|
作者
Thiyagarajan, P. [1 ]
Thandra, Prasanth Kumar [1 ]
Rajan, J. [1 ]
Satyamurthy, S. A. V. [1 ]
Aghila, G. [2 ]
机构
[1] Indira Gandhi Ctr Atom Res, Comp Div, Dept Atom Energy, Kalpakkam 603102, Tamil Nadu, India
[2] Natl Inst Technol, Dept Comp Sci & Engn, Pondicherry 609605, Karaikal, India
关键词
D O I
10.3139/124.110489
中图分类号
TL [原子能技术]; O571 [原子核物理学];
学科分类号
0827 ; 082701 ;
摘要
In recent years, due to the sophistication offered by the Internet, strategic organizations like nuclear power plants are linked to the outside world communication through the Internet. The entry of outside world communication into strategic organization (nuclear power plant) increases the hacker's attempts to crack its security and to trace any information which is being sent among the top level officials. Information security system in nuclear power plant is very crucial as even small loophole in the security system will lead to a major disaster. Recent cyber attacks in nuclear power plant provoked information security professionals to look deeply into the information security aspects of strategic organizations (nuclear power plant). In these lines, Shamir secret sharing scheme with dynamic access structure (SSSDAS) is proposed in the paper which provides enhanced security by providing dynamic access structure for each node in different hierarchies. The SSSDAS algorithm can be applied to any strategic organizations with hierarchical structures. In this paper the possible scenarios where SSSDAS algorithm can be applied to nuclear power plant is explained as a case study. The proposed SSSDAS scheme identifies the wrong shares, if any, used for reconstruction of the secret. The SSSDAS scheme also address the three major security parameters namely confidentiality, authentication and integrity.
引用
收藏
页码:150 / +
页数:12
相关论文
共 50 条
  • [1] Dynamic threshold and cheater resistance for Shamir secret sharing scheme
    Tartary, Christophe
    Wang, Huaxiong
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 103 - 117
  • [2] A quantum secret sharing scheme on access structure
    Qin, Huawang
    Zhu, Xiaohua
    Dai, Yuewei
    JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2016, 39 (02) : 186 - 191
  • [3] A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure
    Yu, Yuyin
    Wang, Mingsheng
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 136 - 142
  • [4] A construction for secret sharing scheme with general access structure
    Guo, C. (guo8016@gmail.com), 1600, Ubiquitous International (04):
  • [5] Secret image sharing scheme with hierarchical threshold access structure
    Pakniat, Nasrollah
    Noroozi, Mahnaz
    Eslami, Ziba
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (05) : 1093 - 1101
  • [6] A New Gradual Secret Sharing Scheme with Diverse Access Structure
    Zarepour-Ahmadabadi, Jamal
    Shiri-Ahmadabadi, MohammadEbrahim
    Miri, Ali
    Latif, AliMohammad
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 99 (03) : 1329 - 1344
  • [7] A New Gradual Secret Sharing Scheme with Diverse Access Structure
    Jamal Zarepour-Ahmadabadi
    MohammadEbrahim Shiri-Ahmadabadi
    Ali Miri
    AliMohammad Latif
    Wireless Personal Communications, 2018, 99 : 1329 - 1344
  • [8] Dynamic hierarchical quantum secret sharing with general access structure
    Li, Fulin
    Chen, Tingyan
    Zhu, Huihui
    Zhu, Shixin
    Pang, Binbin
    QUANTUM INFORMATION PROCESSING, 2023, 22 (08)
  • [9] Dynamic hierarchical quantum secret sharing with general access structure
    Fulin Li
    Tingyan Chen
    Huihui Zhu
    Shixin Zhu
    Binbin Pang
    Quantum Information Processing, 22
  • [10] The optimal linear secret sharing scheme for any given access structure
    Chunming Tang
    Shuhong Gao
    Chengli Zhang
    Journal of Systems Science and Complexity, 2013, 26 : 634 - 649