How to Share Secret Efficiently over Networks

被引:10
|
作者
Harn, Lein [1 ]
Hsu, Ching-Fang [2 ]
Xia, Zhe [3 ,4 ]
Zhou, Junwei [3 ,4 ]
机构
[1] Univ Missouri, Dept Comp Sci Elect Engn, Kansas City, MO 64110 USA
[2] Cent China Normal Univ, Comp Sch, Wuhan 430079, Hubei, Peoples R China
[3] Wuhan Univ Technol, Dept Comp Sci, Wuhan 430071, Hubei, Peoples R China
[4] Wuhan Univ Technol, Hubei Key Lab Transportat Internet Things, Wuhan, Hubei, Peoples R China
基金
中国国家自然科学基金;
关键词
SIGNATURE SCHEME; THRESHOLD;
D O I
10.1155/2017/5437403
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a secret-sharing scheme, the secret is shared among a set of shareholders, and it can be reconstructed if a quorum of these shareholders work together by releasing their secret shares. However, in many applications, it is undesirable for nonshareholders to learn the secret. In these cases, pairwise secure channels are needed among shareholders to exchange the shares. In other words, a shared key needs to be established between every pair of shareholders. But employing an additional key establishment protocol may make the secret-sharing schemes significantly more complicated. To solve this problem, we introduce a new type of secret-sharing, called protected secret-sharing (PSS), in which the shares possessed by shareholders not only can be used to reconstruct the original secret but also can be used to establish the shared keys between every pair of shareholders. Therefore, in the secret reconstruction phase, the recovered secret is only available to shareholders but not to nonshareholders. In this paper, an information theoretically secure PSS scheme is proposed, its security properties are analyzed, and its computational complexity is evaluated. Moreover, our proposed PSS scheme also can be applied to threshold cryptosystems to prevent nonshareholders from learning the output of the protocols.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] BP to share process secret
    Knott, D
    [J]. OIL & GAS JOURNAL, 1997, 95 (09) : 39 - 39
  • [22] How to share heterogeneous sensor networks in Ubiquitous Environment
    Kim, Marie
    Lee, Young Jun
    Ryou, Jaecheol
    [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2799 - +
  • [23] Sagnac secret sharing over telecom fiber networks
    Bogdanski, Jan
    Ahrens, Johan
    Bourennane, Mohamed
    [J]. OPTICS EXPRESS, 2009, 17 (02): : 1055 - 1063
  • [24] HOW SECRET IS SECRET
    HAWKER, P
    [J]. ELECTRONICS & WIRELESS WORLD, 1988, 94 (1633): : 1135 - 1135
  • [25] Change sensor topology when needed: How to efficiently use system resources in control and estimation over wireless networks
    Shi, Ling
    Johansson, Karl Henrik
    Murray, Richard M.
    [J]. PROCEEDINGS OF THE 46TH IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-14, 2007, : 5957 - +
  • [26] Secret Key Establishment for Symmetric Encryption over Adhoc Networks
    Taneja, Sunil
    Kush, Ashwani
    Hwang, C. Jinshong
    [J]. WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, WCECS 2011, VOL II, 2011, : 855 - 859
  • [27] Cryptographic Rational Secret Sharing Schemes over General Networks
    Labao, Alfonso
    Adorna, Henry
    [J]. CRYPTOGRAPHY, 2022, 6 (04)
  • [28] How to Broadcast Efficiently in Vehicular Ad Hoc Networks Without GPS
    Wu, Celimuge
    Ohzahata, Satoshi
    Kato, Toshihiko
    [J]. 2012 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), 2012, : 258 - 264
  • [29] How to Get Group Key Efficiently in Mobile Ad Hoc Networks?
    Gu Xiaozhuo
    Cao Zhenhuan
    Wang Yongming
    [J]. 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 1009 - 1014
  • [30] Efficiently Reinforcing Social Networks over User Engagement and Tie Strength
    Zhang, Fan
    Zhang, Ying
    Qin, Lu
    Zhang, Wenjie
    Lin, Xuemin
    [J]. 2018 IEEE 34TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2018, : 557 - 568