Secure Protocol with Variable Security Level Using Secret Sharing Scheme

被引:0
|
作者
Ueno, Shohei [1 ]
Kanai, Atsushi [1 ]
Tanimoto, Shigeaki [2 ]
Sato, Hiroyuki [3 ]
机构
[1] Hosei Univ, Grad Sch Sci & Engn, Tokyo, Japan
[2] Chiba Inst Technol, Chiba, Japan
[3] Univ Tokyo, Tokyo, Japan
关键词
component; secure protocol; secret sharing scheme; security level; MESSAGE TRANSMISSION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The security level of conventional secure protocols is fixed after security environment negotiation. However, communications differ in confidentiality in accordance with their contents. For this reason, a conventional protocol that always keeps the security level constant throughout the whole session is considered to be more secure than necessary. Since transmission efficiency is generally improved by lowering the security level, transmission efficiency is sacrificed when a conventional secure protocol is used. In this study, the secure protocol that dynamically and optimally changes the security level is proposed to solve this problem. Specifically, a variable security level is achieved by using a secret sharing scheme and multiple channels. Furthermore, the proposed protocol is theoretically evaluated.
引用
收藏
页码:626 / 627
页数:2
相关论文
共 50 条
  • [31] Security and Fairness in Multiparty Quantum Secret Sharing Protocol
    Di Santo, Alessio
    Tiberti, Walter
    Cassioli, Dajana
    IEEE TRANSACTIONS ON QUANTUM ENGINEERING, 2025, 6
  • [32] Secure Multi-party Comparing Protocol based on Multi-threshold Secret Sharing Scheme
    Liu Wen
    Luo Shou-shan
    Wang Yong-bin
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [33] An Efficient Security Scheme for Vehicular Communication Using a Quantum Secret Sharing Method
    Xiao, Hailin
    Chronopoulos, Anthony Theodore
    Zhang, Zhongshan
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (01) : 1101 - 1105
  • [34] UNCONDITIONALLY SECURE FAIR (t, n)-SECRET SHARING SCHEME
    Al Mahmoud, Qassim
    Besoul, Khaldoun
    Alhalaybeh, Ayman
    ADVANCES AND APPLICATIONS IN DISCRETE MATHEMATICS, 2023, 38 (01): : 127 - 143
  • [35] A secure and efficient secret sharing scheme with general access structures
    Pang, Liao-Jun
    Li, Hui-Xian
    Wang, Yu-Min
    FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PROCEEDINGS, 2006, 4223 : 646 - 649
  • [36] Unconditionally secure proactive secret sharing scheme with combinatorial structures
    Stinson, DR
    Wei, R
    SELECTED AREAS IN CRYPTOGRAPHY, PROCEEDINGS, 2000, 1758 : 200 - 214
  • [37] A protocol of member-join in a secret sharing scheme
    Li, Xiao
    He, Mingxing
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2006, 3903 : 134 - 141
  • [38] AN EFFICIENT AND SECURE (t, n) THRESHOLD SECRET SHARING SCHEME
    Pang Liaojun Sun Xi Wang Yumin (The National Key Lab of Integrated Service Networks
    Journal of Electronics(China), 2006, (05) : 731 - 735
  • [39] New secure distributed secret sharing scheme of n product
    Chen, Zhen-Hua
    Li, Shun-Dong
    Wang, Bao-Cang
    Li, Ji-Liang
    Liu, Xin
    Tongxin Xuebao/Journal on Communications, 2014, 35 (11): : 139 - 145
  • [40] A Simple and Efficient Secret Sharing Scheme Secure against Cheating
    Araki, Toshinori
    Ogata, Wakaha
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (06) : 1338 - 1345