Shamir Secret Sharing Scheme with Dynamic Access Structure (SSSDAS): case study on nuclear power plant

被引:2
|
作者
Thiyagarajan, P. [1 ]
Thandra, Prasanth Kumar [1 ]
Rajan, J. [1 ]
Satyamurthy, S. A. V. [1 ]
Aghila, G. [2 ]
机构
[1] Indira Gandhi Ctr Atom Res, Comp Div, Dept Atom Energy, Kalpakkam 603102, Tamil Nadu, India
[2] Natl Inst Technol, Dept Comp Sci & Engn, Pondicherry 609605, Karaikal, India
关键词
D O I
10.3139/124.110489
中图分类号
TL [原子能技术]; O571 [原子核物理学];
学科分类号
0827 ; 082701 ;
摘要
In recent years, due to the sophistication offered by the Internet, strategic organizations like nuclear power plants are linked to the outside world communication through the Internet. The entry of outside world communication into strategic organization (nuclear power plant) increases the hacker's attempts to crack its security and to trace any information which is being sent among the top level officials. Information security system in nuclear power plant is very crucial as even small loophole in the security system will lead to a major disaster. Recent cyber attacks in nuclear power plant provoked information security professionals to look deeply into the information security aspects of strategic organizations (nuclear power plant). In these lines, Shamir secret sharing scheme with dynamic access structure (SSSDAS) is proposed in the paper which provides enhanced security by providing dynamic access structure for each node in different hierarchies. The SSSDAS algorithm can be applied to any strategic organizations with hierarchical structures. In this paper the possible scenarios where SSSDAS algorithm can be applied to nuclear power plant is explained as a case study. The proposed SSSDAS scheme identifies the wrong shares, if any, used for reconstruction of the secret. The SSSDAS scheme also address the three major security parameters namely confidentiality, authentication and integrity.
引用
收藏
页码:150 / +
页数:12
相关论文
共 50 条
  • [21] Quantum Optimal Multiple Assignment Scheme for Realizing General Access Structure of Secret Sharing
    Matsumoto, Ryutaroh
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (02): : 726 - 728
  • [22] An Efficient and Secure Multi-Secret Image Sharing Scheme with General Access Structure
    Lee, Ching-Fan
    Juan, Justie Su-Tzu
    2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, : 253 - 259
  • [23] Multi-Use Multi-Secret Sharing Scheme for General Access Structure
    Roy, Partha Sarathi
    Adhikari, Avishek
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (04): : 50 - 57
  • [24] Multi-secret Sharing Scheme Using Modular Inverse for Compartmented Access Structure
    Basit, Abdul
    Venkaiah, V. Ch
    Moiz, Salman Abdul
    DATA ENGINEERING AND COMMUNICATION TECHNOLOGY, ICDECT-2K19, 2020, 1079 : 371 - 385
  • [25] Sequential (t,n) multi secret sharing scheme for level-ordered access structure
    Tentu A.N.
    Bhavani K.
    Basit A.
    Venkaiah V.C.
    International Journal of Information Technology, 2021, 13 (6) : 2265 - 2275
  • [26] An Efficient Multi-secret Sharing Scheme with the Quasi-threshold Multipartite Access Structure
    Shi, Runhua
    Huang, Liusheng
    Yang, Wei
    Zhong, Hong
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 151 - 154
  • [27] A cheat-proof multi-secret sharing scheme based on general access structure
    College of Information, Guangdong Ocean University, Zhanjiang 524088, China
    不详
    Jisuanji Gongcheng, 2006, 13 (159-160+172):
  • [28] A New Multi-stage Secret Sharing Scheme for Hierarchical Access Structure with Existential Quantifier
    Xu, Guoai
    Yuan, Jiangtao
    Xu, Guosheng
    Jia, Xingxing
    INFORMATION TECHNOLOGY AND CONTROL, 2021, 50 (02): : 236 - 246
  • [29] An Ideal Secret Sharing Scheme Realizing an Access Structure Based on a Finite Projective Plane of Order 3
    Okawa, Yohei
    Koga, Hiroki
    2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2020, : 852 - 857
  • [30] New multi-secret sharing scheme based on superincreasing sequence for level-ordered access structure
    Basit, Abdul
    Chanakya, Patibandla
    Venkaiah, V. Ch
    Moiz, Salman Abdul
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2020, 24 (04) : 357 - 380