Dynamic Threshold Multi-secret Sharing Scheme Using Elliptic Curve and Bilinear Maps

被引:0
|
作者
Wang, Shiuh-Jeng [1 ]
Tsai, Yuh-Ren [2 ]
Shen, Jian-Jhih [2 ]
机构
[1] Cent Police Univ, Dept Informat Management, Tao Yuan 33304, Taiwan
[2] Natl Tsing Hua Univ, Inst Commun Engn, Hsinchu 30013, Taiwan
关键词
Dynamic threshold; verifiable multi-secret scheme; permanent private secret;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper, we propose a dynamic threshold and verifiable multi-secret sharing scheme. Some secrets are protected by distributing them among many participants, whereby only an authorized group of participants can reconstruct the secrets. In our scheme, the secret will change periodically and the dealer will periodically publish some of the information, in addition, the participants can verify the information which they have received. Each participant holds only one permanent, private secret, and some of them use it during different time periods to reconstruct the corresponding shared secrets without revealing their own private information. Because some public information is renewed in our scheme, the old information has nothing to do with the next secret. We also compare our scheme to Chen et al.'s [9] scheme, and we will present some analyses which show that our scheme has smaller storage requirements than the previous scheme.
引用
收藏
页码:883 / +
页数:2
相关论文
共 50 条
  • [1] Dynamic and verifiable threshold multi-secret sharing scheme based on bilinear pairings
    Li, Huina
    ICIC Express Letters, 2015, 9 (10): : 2819 - 2825
  • [2] Dynamic and verifiable multi-secret sharing scheme based on Hermite interpolation and bilinear maps
    Tadayon, Mohammad Hesam
    Khanmohammadi, Hadi
    Haghighi, Mohammad Sayad
    IET INFORMATION SECURITY, 2015, 9 (04) : 234 - 239
  • [3] A Verifiable Multi-Secret Sharing Scheme with Elliptic Curve Cryptography
    Chattopadhyay, Arup Kumar
    Maitra, Paramita
    Nag, Amitava
    Saha, Himadri Nath
    2018 IEEE 9TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2018, : 1374 - 1379
  • [4] A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps
    Eslami, Ziba
    Rad, Saideh Kabiri
    WIRELESS PERSONAL COMMUNICATIONS, 2012, 63 (02) : 459 - 467
  • [5] A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps
    Ziba Eslami
    Saideh Kabiri Rad
    Wireless Personal Communications, 2012, 63 : 459 - 467
  • [6] A scheme for threshold multi-secret sharing
    Chan, CW
    Chang, CC
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) : 1 - 14
  • [7] A threshold multi-secret sharing scheme
    Shi Runhua
    Huang Liusheng
    Luo yonglong
    Zhong Hong
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1705 - +
  • [8] A Hierarchical Threshold Multi-secret Sharing Scheme
    Shi Runhua
    Zhong Hong
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 231 - 234
  • [9] Verifiable threshold multi-secret sharing scheme
    Pang, Liao-Jun
    Li, Hui-Xian
    Li, Zhi-Jie
    Wang, Yu-Min
    Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2008, 40 (09): : 1462 - 1465
  • [10] Multi-secret sharing threshold visual cryptography scheme
    Yu, Bin
    Xu, Xiaohui
    Fang, Liguo
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 815 - +