Dynamic Threshold Multi-secret Sharing Scheme Using Elliptic Curve and Bilinear Maps

被引:0
|
作者
Wang, Shiuh-Jeng [1 ]
Tsai, Yuh-Ren [2 ]
Shen, Jian-Jhih [2 ]
机构
[1] Cent Police Univ, Dept Informat Management, Tao Yuan 33304, Taiwan
[2] Natl Tsing Hua Univ, Inst Commun Engn, Hsinchu 30013, Taiwan
关键词
Dynamic threshold; verifiable multi-secret scheme; permanent private secret;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper, we propose a dynamic threshold and verifiable multi-secret sharing scheme. Some secrets are protected by distributing them among many participants, whereby only an authorized group of participants can reconstruct the secrets. In our scheme, the secret will change periodically and the dealer will periodically publish some of the information, in addition, the participants can verify the information which they have received. Each participant holds only one permanent, private secret, and some of them use it during different time periods to reconstruct the corresponding shared secrets without revealing their own private information. Because some public information is renewed in our scheme, the old information has nothing to do with the next secret. We also compare our scheme to Chen et al.'s [9] scheme, and we will present some analyses which show that our scheme has smaller storage requirements than the previous scheme.
引用
收藏
页码:883 / +
页数:2
相关论文
共 50 条
  • [41] A practical verifiable multi-secret sharing scheme
    Zhao, Jianjie
    Zhang, Jianzhong
    Zhao, Rong
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) : 138 - 141
  • [42] Threshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theorem
    Sheikhi-Garjan, Maryam
    Bahramian, Mojtaba
    Doche, Christophe
    IET INFORMATION SECURITY, 2019, 13 (03) : 278 - 284
  • [43] Threshold signcryption scheme based on elliptic curve cryptosystem and verifiable secret sharing
    Peng, CG
    Li, X
    2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1136 - 1139
  • [44] Secure multi-level threshold multi-secret sharing
    Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China
    Qinghua Daxue Xuebao, 2007, 4 (592-594):
  • [45] Consideration for multi-threshold multi-secret sharing schemes
    Waseda, Atsushi
    Soshi, Masakazu
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2012), 2012, : 265 - 269
  • [46] Threshold Multi-Secret Sharing Scheme for Cheat-Proof among Weighted Participants
    Wu Yan
    Du Weifeng
    Zhou Xiaoyan
    Gao Yan
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL II, 2009, : 252 - +
  • [47] A New Double Layer Multi-Secret Sharing Scheme
    Elavarasi Gunasekaran
    Vanitha Muthuraman
    China Communications, 2024, 21 (01) : 297 - 309
  • [48] Multi-Secret Image Sharing Scheme by Boolean Operations
    Chen, Chien-Chang
    Lin, Cheng-Shian
    Chen, Jia-Zhan
    2022 IEEE 18TH INTERNATIONAL COLLOQUIUM ON SIGNAL PROCESSING & APPLICATIONS (CSPA 2022), 2022, : 397 - 402
  • [49] An Efficient Multi-secret Sharing Scheme with the Quasi-threshold Multipartite Access Structure
    Shi, Runhua
    Huang, Liusheng
    Yang, Wei
    Zhong, Hong
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 151 - 154
  • [50] A generalized multi-secret sharing scheme to identify cheaters
    Huang, Zhi-Xiong
    Li, Qun-Hui
    Wei, Ren-Yong
    Li, Zhi-Yong
    Tiedao Xuebao/Journal of the China Railway Society, 2007, 29 (06): : 52 - 56