Unconditional Secure Topology-hiding Broadcast Via Shamir's Secret Sharing

被引:0
|
作者
Bo Mi [1 ]
Wu, Bingqing [1 ]
Kuang, Fengtian [1 ]
Huang darong [1 ]
Wu, Shijie [2 ]
Lin, Mengting [1 ]
机构
[1] Chongqing Jiaotong Univ, Acad Informat Sci & Engn, Chongqing 400074, Peoples R China
[2] Chinese Peoples Liberat Army, Unit 78156, Beijing, Peoples R China
关键词
Multi-Party Computation; Topology-hiding; Shamir's Secret Sharing; Broadcast;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure Multi-Party Computation is a hot topic in recent years. However, though Secure Multi-Party Computation allows each participant to calculate without making their information known to other nodes, the underlying topology of their network is prone to exposure. Inspired by Tal Moran, Bo Mi et al. designed a broadcast protocol based on NTRUEcrypt, which realized topology-hiding but relying on a third party. In view of this shortcoming, we proposed a topology-hiding broadcast protocol based on Shamir's Secret Sharing scheme with self-adaptive paradigm. Security and performance analyses demonstrated that our scheme is unconditional secure and computationally light-weighted.
引用
收藏
页码:679 / 683
页数:5
相关论文
共 50 条
  • [1] Topology-Hiding Broadcast Based on NTRUEncrypt
    Mi, Bo
    Liu, Dongyan
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (01): : 431 - 443
  • [2] Hardware implementation of secure Shamir's secret sharing scheme
    Luo, Pei
    Lin, Andy Yu-Lun
    Wang, Zhen
    Karpovsky, Mark
    [J]. 2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON HIGH-ASSURANCE SYSTEMS ENGINEERING (HASE), 2014, : 193 - 200
  • [3] Secure PAC Bayesian Regression via Real Shamir Secret Sharing
    Gundersen, Jaron Skovsted
    Kuskonmaz, Bulut
    Wisniewski, Rafael
    [J]. 2023 EUROPEAN CONTROL CONFERENCE, ECC, 2023,
  • [4] Self-adaptive Topology-hiding Broadcast based on CRT
    Mi Bo
    Wei Tiancheng
    Huang Darong
    Li Yang
    [J]. PROCEEDINGS OF 2020 IEEE 9TH DATA DRIVEN CONTROL AND LEARNING SYSTEMS CONFERENCE (DDCLS'20), 2020, : 1043 - 1047
  • [5] Design of Reliable and Secure Devices Realizing Shamir's Secret Sharing
    Wang, Zhen
    Karpovsky, Mark
    Bu, Lake
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) : 2443 - 2455
  • [6] Medical image security and EPR hiding using Shamir's secret sharing scheme
    Ulutas, Mustafa
    Ulutas, Guzin
    Nabiyev, Vasif V.
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (03) : 341 - 353
  • [7] Proposal of a Secure Modbus RTU Communication with Adi Shamir's Secret Sharing Method
    Adamko, Eva
    Jakaboczki, Gabor
    Szemes, Peter Tamas
    [J]. INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2018, 64 (02) : 107 - 114
  • [8] Reversible data hiding based on Shamir's secret sharing for color images over cloud
    Singh, Priyanka
    Raman, Balasubramanian
    [J]. INFORMATION SCIENCES, 2018, 422 : 77 - 97
  • [9] Achieving Secure and Reliable UAV Authentication: A Shamir's Secret Sharing Based Approach
    Bansal, Gaurang
    Sikdar, Biplab
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (04): : 3598 - 3610
  • [10] Security limitations of Shamir's secret sharing
    Lemnouar, Noui
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (04): : 977 - 989