How to Share Secret Efficiently over Networks

被引:10
|
作者
Harn, Lein [1 ]
Hsu, Ching-Fang [2 ]
Xia, Zhe [3 ,4 ]
Zhou, Junwei [3 ,4 ]
机构
[1] Univ Missouri, Dept Comp Sci Elect Engn, Kansas City, MO 64110 USA
[2] Cent China Normal Univ, Comp Sch, Wuhan 430079, Hubei, Peoples R China
[3] Wuhan Univ Technol, Dept Comp Sci, Wuhan 430071, Hubei, Peoples R China
[4] Wuhan Univ Technol, Hubei Key Lab Transportat Internet Things, Wuhan, Hubei, Peoples R China
基金
中国国家自然科学基金;
关键词
SIGNATURE SCHEME; THRESHOLD;
D O I
10.1155/2017/5437403
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a secret-sharing scheme, the secret is shared among a set of shareholders, and it can be reconstructed if a quorum of these shareholders work together by releasing their secret shares. However, in many applications, it is undesirable for nonshareholders to learn the secret. In these cases, pairwise secure channels are needed among shareholders to exchange the shares. In other words, a shared key needs to be established between every pair of shareholders. But employing an additional key establishment protocol may make the secret-sharing schemes significantly more complicated. To solve this problem, we introduce a new type of secret-sharing, called protected secret-sharing (PSS), in which the shares possessed by shareholders not only can be used to reconstruct the original secret but also can be used to establish the shared keys between every pair of shareholders. Therefore, in the secret reconstruction phase, the recovered secret is only available to shareholders but not to nonshareholders. In this paper, an information theoretically secure PSS scheme is proposed, its security properties are analyzed, and its computational complexity is evaluated. Moreover, our proposed PSS scheme also can be applied to threshold cryptosystems to prevent nonshareholders from learning the output of the protocols.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] HOW TO PROGRAM EFFICIENTLY
    LEUNG, K
    [J]. CHEMICAL ENGINEERING, 1984, 91 (16) : 77 - &
  • [42] Exploring Cyclic Prefix for Secret Data Transmission over LTE Networks
    Nain, Ajay Kumar
    Rajalakshmi, P.
    [J]. 2018 IEEE 4TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2018, : 635 - 640
  • [43] Location-aware and secret share based dynamic key management scheme for wireless sensor networks
    Ma, Chunguang
    Geng, Guining
    Wang, Huiqiang
    Yang, Guang
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 770 - 773
  • [44] Solving the Towers of Hanoi - how an amoeboid organism efficiently constructs transport networks
    Reid, Chris R.
    Beekman, Madeleine
    [J]. JOURNAL OF EXPERIMENTAL BIOLOGY, 2013, 216 (09): : 1546 - 1551
  • [45] HOW TO KEEP A TRADE SECRET SECRET
    LIEBERSTEIN, SH
    [J]. WHARTON MAGAZINE, 1978, 3 (01): : 44 - &
  • [46] An efficient cluster-based proactive secret share update scheme for mobile ad hoc networks
    Dong, Ying
    Sui, Ai Fen
    Yiu, Siu Ming
    Li, Victor O. K.
    Hui, Lucas C. K.
    Go, H. W.
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1241 - +
  • [47] HOW TO KEEP A TRADE SECRET, SECRET
    LIEBERSTEIN, SH
    [J]. CHEMTECH, 1980, 10 (10) : 598 - 602
  • [48] Multicasting versus Anycasting: How to Efficiently Deliver Content in Elastic Optical Networks
    Aibin, Michal
    Goscien, Roza
    Walkowiak, Krzysztof
    [J]. 2016 18TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS (ICTON), 2016,
  • [49] An Information Sharing Framework for Supply Chain Networks: What, When, and How to Share
    Lee, Eunji
    Minner, Stefan
    [J]. ADVANCES IN PRODUCTION MANAGEMENT SYSTEMS: ARTIFICIAL INTELLIGENCE FOR SUSTAINABLE AND RESILIENT PRODUCTION SYSTEMS, APMS 2021, PT IV, 2021, 633 : 159 - 168
  • [50] How Nations Share
    Christians, Allison
    [J]. INDIANA LAW JOURNAL, 2012, 87 (04) : 1407 - 1453