Secure Protocol with Variable Security Level Using Secret Sharing Scheme

被引:0
|
作者
Ueno, Shohei [1 ]
Kanai, Atsushi [1 ]
Tanimoto, Shigeaki [2 ]
Sato, Hiroyuki [3 ]
机构
[1] Hosei Univ, Grad Sch Sci & Engn, Tokyo, Japan
[2] Chiba Inst Technol, Chiba, Japan
[3] Univ Tokyo, Tokyo, Japan
关键词
component; secure protocol; secret sharing scheme; security level; MESSAGE TRANSMISSION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The security level of conventional secure protocols is fixed after security environment negotiation. However, communications differ in confidentiality in accordance with their contents. For this reason, a conventional protocol that always keeps the security level constant throughout the whole session is considered to be more secure than necessary. Since transmission efficiency is generally improved by lowering the security level, transmission efficiency is sacrificed when a conventional secure protocol is used. In this study, the secure protocol that dynamically and optimally changes the security level is proposed to solve this problem. Specifically, a variable security level is achieved by using a secret sharing scheme and multiple channels. Furthermore, the proposed protocol is theoretically evaluated.
引用
收藏
页码:626 / 627
页数:2
相关论文
共 50 条
  • [1] SSeCloud: Using secret sharing scheme to secure keys
    Hu, Liang
    Huang, Yang
    Yang, Disheng
    Zhang, Yuzhen
    Liu, Hengchang
    2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, ENERGY TECHNOLOGY AND ENVIRONMENTAL ENGINEERING (MSETEE 2017), 2017, 81
  • [2] Improved protocols for secure multiplication using secret sharing scheme
    Kamal, Ahmad Akmal Aminuddin Mohd
    Fujisawa, Masaya
    ICT EXPRESS, 2024, 10 (05): : 1019 - 1025
  • [3] Optimized Scheme to Secure IoT Systems Based on Sharing Secret in Multipath Protocol
    El Mahdi, Fatna
    Habbani, Ahmed
    Kartit, Zaid
    Bouamoud, Bachir
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [4] A (t, n) Secure Sum Multiparty Computation Protocol Using Multivariate Polynomial Secret Sharing Scheme
    Praveen, K.
    Sasi, Nithin
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 : 457 - 463
  • [5] Unconditionally secure social secret sharing scheme
    Nojoumian, M.
    Stinson, D. R.
    Grainger, M.
    IET INFORMATION SECURITY, 2010, 4 (04) : 202 - 211
  • [6] A Secure Verifiable Scheme for Secret Image Sharing
    Rose, Angel A.
    Thampi, Sabu M.
    SECOND INTERNATIONAL SYMPOSIUM ON COMPUTER VISION AND THE INTERNET (VISIONNET'15), 2015, 58 : 140 - 150
  • [7] Security Enhancement in Cloud Environment using Secure Secret Key Sharing
    Chhabra, Sakshi
    Singh, Ashutosh Kumar
    JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2020, 16 (04) : 296 - 307
  • [8] Secure electronic voting using Publicly Verifiable Secret Sharing scheme
    Song, Chun-lai
    Yin, Xin-chun
    2005 International Symposium on Computer Science and Technology, Proceedings, 2005, : 627 - 630
  • [9] Secret Sharing Scheme Security and Performance Analysis
    Abdallah, Aisha
    Salleh, Mazleena
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, CONTROL, NETWORKING, ELECTRONICS AND EMBEDDED SYSTEMS ENGINEERING (ICCNEEE), 2015, : 173 - 180
  • [10] Provably Secure On-Line Secret Sharing Scheme
    Oba, Tatsumi
    Ogata, Wakaha
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 139 - 149