Dynamic Threshold Multi-secret Sharing Scheme Using Elliptic Curve and Bilinear Maps

被引:0
|
作者
Wang, Shiuh-Jeng [1 ]
Tsai, Yuh-Ren [2 ]
Shen, Jian-Jhih [2 ]
机构
[1] Cent Police Univ, Dept Informat Management, Tao Yuan 33304, Taiwan
[2] Natl Tsing Hua Univ, Inst Commun Engn, Hsinchu 30013, Taiwan
关键词
Dynamic threshold; verifiable multi-secret scheme; permanent private secret;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper, we propose a dynamic threshold and verifiable multi-secret sharing scheme. Some secrets are protected by distributing them among many participants, whereby only an authorized group of participants can reconstruct the secrets. In our scheme, the secret will change periodically and the dealer will periodically publish some of the information, in addition, the participants can verify the information which they have received. Each participant holds only one permanent, private secret, and some of them use it during different time periods to reconstruct the corresponding shared secrets without revealing their own private information. Because some public information is renewed in our scheme, the old information has nothing to do with the next secret. We also compare our scheme to Chen et al.'s [9] scheme, and we will present some analyses which show that our scheme has smaller storage requirements than the previous scheme.
引用
收藏
页码:883 / +
页数:2
相关论文
共 50 条
  • [31] An Attack on a Dynamic Multi-Secret Sharing Scheme And Enhancing Its Security
    Tadayon, M. H.
    Khanmohammadi, H.
    Arabi, S.
    2013 21ST IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2013,
  • [32] A verifiable multi-secret sharing scheme (VMSS)
    Pang Liaojun
    Li Huixian
    Jiao Licheng
    Wang Yumin
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 749 - +
  • [33] Efficient Multi-secret Sharing Scheme Using Room Square
    Li, Ming-Jheng
    Chang, Ying-Hsuan
    Juan, Justie Su-Tzu
    2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, : 260 - 266
  • [34] Verifiable Rational Multi-secret Sharing Scheme
    Cai, Yongquan
    Luo, Zhanhai
    Yang, Yi
    INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 : 42 - 48
  • [35] A secure and efficient (t, n) threshold verifiable multi-secret sharing scheme
    Huang, MJ
    Zhang, JZ
    Xie, SC
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 532 - 537
  • [36] A (t, n)-threshold verified multi-secret sharing scheme based on ECDLP
    Shi, Runhua
    Zhong, Hong
    Huang, Liusheng
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 2, PROCEEDINGS, 2007, : 9 - +
  • [37] Threshold multi-secret sharing scheme based on phase-shifting interferometry
    Deng, Xiaopeng
    Wen, Wei
    Shi, Zhengang
    OPTICS COMMUNICATIONS, 2017, 387 : 409 - 414
  • [38] Verifiable Threshold Scheme in Multi-Secret Sharing Distributions upon Extensions of ECC
    Wang, Shiuh-Jeng
    Tsai, Yuh-Ren
    Shen, Chien-Chih
    WIRELESS PERSONAL COMMUNICATIONS, 2011, 56 (01) : 173 - 182
  • [39] On Novel Verifiable Multi-Secret Sharing Scheme
    Wang, Jian
    Liu, Yanheng
    Wang, Yanxi
    ADVANCED SCIENCE LETTERS, 2011, 4 (11-12) : 3709 - 3715
  • [40] A (t, n) multi-secret sharing scheme
    Yang, CC
    Chang, TY
    Hwang, MS
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 151 (02) : 483 - 490