Secure Verifiable Secret Short Sharing Scheme for Multi-Cloud Storage

被引:9
|
作者
Deryabin, Maxim [1 ]
Chervyakov, Nikolay [1 ]
Tchernykh, Andrei [2 ,3 ,4 ]
Babenko, Mikhail [1 ]
Kucherov, Nikolay [1 ]
Miranda-Lopez, Vanessa [2 ]
Avetisyan, Arutyun [4 ]
机构
[1] North Caucasus Fed Univ, Stavropol, Russia
[2] CICESE Res Ctr, Ensenada, Baja California, Mexico
[3] South Ural State Univ, Chelyabinsk, Russia
[4] RAS, Inst Syst Programming, Moscow, Russia
基金
俄罗斯基础研究基金会;
关键词
Threshold secret sharing scheme; computationally secure secret sharing; verifiable scheme; Residue Number System; cloud data storage; distributed storage; multi-clouds; INFORMATION; SYSTEMS;
D O I
10.1109/HPCS.2018.00114
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we propose a new approach to the construction of computationally secure secret sharing scheme based on the simultaneous use of the Residue Number System (RNS), as the symmetric encryption, and the perfect Asmuth-Bloom secret sharing scheme. We combine the useful features of Redundant RNS to design space efficient secret sharing scheme with enough level of security and to control of data integrity. This combination provides verifiability and achieves a high speed of data processing.
引用
收藏
页码:700 / 706
页数:7
相关论文
共 50 条
  • [1] A Secure Verifiable Scheme for Secret Image Sharing
    Rose, Angel A.
    Thampi, Sabu M.
    [J]. SECOND INTERNATIONAL SYMPOSIUM ON COMPUTER VISION AND THE INTERNET (VISIONNET'15), 2015, 58 : 140 - 150
  • [2] A secure and efficient multi cloud-based data storage and retrieval using hash-based verifiable secret sharing scheme
    Farhadi, Majid
    Bypour, Hamideh
    Asadi, Seyyed Erfan
    [J]. International Journal of Cloud Computing, 2020, 9 (04) : 412 - 431
  • [3] Secure and verifiable vector space secret sharing scheme
    Xiao, QH
    Ping, LD
    Pan, XZ
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOL 2, 2004, : 689 - 693
  • [4] A (n, t, n) Verifiable Multi-secret Sharing Scheme with Secure Secret Reconstruction
    Meng, Li
    Qu Shaoyun
    Xun Tiantian
    Jia, Yu
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 191 - 204
  • [5] A Verifiable Secret Sharing Approach for Secure MultiCloud Storage
    Benzekki, Kamal
    El Fergougui, Abdeslam
    Elalaoui, Abdelbaki Elbelrhiti
    [J]. UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 : 225 - 234
  • [6] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    [J]. INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138
  • [7] Engineering of secure multi-cloud storage
    Junghanns, Philipp
    Fabian, Benjamin
    Ermakova, Tatiana
    [J]. COMPUTERS IN INDUSTRY, 2016, 83 : 108 - 120
  • [8] A secure and efficient (t, n) threshold verifiable multi-secret sharing scheme
    Huang, MJ
    Zhang, JZ
    Xie, SC
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 532 - 537
  • [9] A Verifiable Multi-Secret Sharing Scheme Based on Short Integer Solution
    LI Fulin
    YAN Jiayun
    ZHU Shixin
    HU Hang
    [J]. Chinese Journal of Electronics, 2023, 32 (03) : 556 - 563
  • [10] A Verifiable Multi-Secret Sharing Scheme Based on Short Integer Solution
    Li Fulin
    Yan Jiayun
    Zhu Shixin
    Hu Hang
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2023, 32 (03) : 556 - 563