Secure Protocol with Variable Security Level Using Secret Sharing Scheme

被引:0
|
作者
Ueno, Shohei [1 ]
Kanai, Atsushi [1 ]
Tanimoto, Shigeaki [2 ]
Sato, Hiroyuki [3 ]
机构
[1] Hosei Univ, Grad Sch Sci & Engn, Tokyo, Japan
[2] Chiba Inst Technol, Chiba, Japan
[3] Univ Tokyo, Tokyo, Japan
关键词
component; secure protocol; secret sharing scheme; security level; MESSAGE TRANSMISSION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The security level of conventional secure protocols is fixed after security environment negotiation. However, communications differ in confidentiality in accordance with their contents. For this reason, a conventional protocol that always keeps the security level constant throughout the whole session is considered to be more secure than necessary. Since transmission efficiency is generally improved by lowering the security level, transmission efficiency is sacrificed when a conventional secure protocol is used. In this study, the secure protocol that dynamically and optimally changes the security level is proposed to solve this problem. Specifically, a variable security level is achieved by using a secret sharing scheme and multiple channels. Furthermore, the proposed protocol is theoretically evaluated.
引用
收藏
页码:626 / 627
页数:2
相关论文
共 50 条
  • [41] AN EFFICIENT AND SECURE (t, n) THRESHOLD SECRET SHARING SCHEME
    Pang Liaojun Sun Xi Wang Yumin The National Key Lab of Integrated Service Networks Xidian Univ Xian China
    JournalofElectronics, 2006, (05) : 731 - 735
  • [42] A Secure Routing Scheme in MANET with CRT based Secret Sharing
    Sinha, Ditipriya
    Chaki, Rituparna
    Bhattacharya, Uma
    2012 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (ICCIT), 2012, : 225 - 229
  • [43] Double layer secure secret images sharing scheme for biometrics
    Elavarasi Gunasekaran
    Vanitha Muthuraman
    Distributed and Parallel Databases, 2022, 40 : 861 - 885
  • [44] Double layer secure secret images sharing scheme for biometrics
    Gunasekaran, Elavarasi
    Muthuraman, Vanitha
    DISTRIBUTED AND PARALLEL DATABASES, 2022, 40 (04) : 861 - 885
  • [45] Multi-group key agreement protocol using secret sharing scheme
    Subrahmanyam R.
    Rekha N.R.
    Rao Y.V.S.
    International Journal of Security and Networks, 2023, 18 (03) : 143 - 152
  • [46] Provably secure secret sharing scheme based on bilinear maps
    Li, Hui-Xian
    Pang, Liao-Jun
    Tongxin Xuebao/Journal on Communications, 2008, 29 (10): : 45 - 50
  • [47] Hardware implementation of secure Shamir's secret sharing scheme
    Luo, Pei
    Lin, Andy Yu-Lun
    Wang, Zhen
    Karpovsky, Mark
    2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON HIGH-ASSURANCE SYSTEMS ENGINEERING (HASE), 2014, : 193 - 200
  • [48] MDS secret-sharing scheme secure against cheaters
    Okada, K
    Kurosawa, K
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (03) : 1078 - 1081
  • [49] A Secure and Robust Audio Watermarking Scheme Using Secret Sharing in the Transform-Domain
    Abbasi, Aliya Tabassum
    Miao, Fuyou
    Islam, Md Shohidul
    CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2025, 44 (02) : 1274 - 1307
  • [50] Secure Data Outsourcing in the Cloud Using Multi-secret Sharing Scheme (MSSS)
    Nag, Amitava
    Choudhary, Soni
    Dawn, Subham
    Basu, Suryadip
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND COMMUNICATION, 2017, 458 : 337 - 343