A Multi-Secret Reputation Adjustment Method in the Secret Sharing for Internet of Vehicles

被引:1
|
作者
Wu, Jingbang [1 ]
Chen, Xiyu [1 ]
Zhang, Luyuan [1 ]
Zhou, Shufen [1 ]
Wang, Daoshun [2 ]
机构
[1] Beijing Technol & Business Univ, Sch Comp Sci & Engn, Beijing 100048, Peoples R China
[2] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
DATA DISSEMINATION; SECURE; SCHEME; PRIVACY; INFRASTRUCTURE; COMMUNICATION; VANETS;
D O I
10.1155/2022/1413976
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure data sharing for the Internet of Vehicles (IoV) has drawn much attention in developing smart cities and smart transportation. One way to achieve that is based on the reputation of the participant vehicles and the interaction between them. Most of the reputation adjustment schemes are aimed at single-secret situations, and there are cases where shared information leaks after reconstruction; and the shared information of all participants need to be updated again. This paper uses binary asymmetric polynomials to realize the asynchronous reconstruction of secrets, that is, multiple secrets are distributed at once, and each secret is independent of each other when it is restored. Each participant holds the shared divided information part of a one-variable polynomial. When the secret is reconstructed, the shared information part is not directly shown to ensure that the shared information is not leaked. Furthermore, we provide another way to keep the secret unchanged and modify the secret threshold.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] A scheme for threshold multi-secret sharing
    Chan, CW
    Chang, CC
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) : 1 - 14
  • [2] Visual Multi-Secret Sharing with Friendliness
    郑富国
    林恺翔
    林志鸿
    陈宗和
    Journal of Shanghai Jiaotong University(Science), 2014, 19 (04) : 455 - 465
  • [3] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138
  • [4] A threshold multi-secret sharing scheme
    Shi Runhua
    Huang Liusheng
    Luo yonglong
    Zhong Hong
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1705 - +
  • [5] ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism
    Ruonan Shi
    Yuling Chen
    Chaoyue Tan
    Yun Luo
    Tao Li
    Journal of Cloud Computing, 12
  • [6] Linear multi-secret sharing schemes
    Xiao, LL
    Liu, ML
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2005, 48 (01): : 125 - 136
  • [7] Linear multi-secret sharing schemes
    Liangliang Xiao
    Mulan Liu
    Science in China Series F: Information Sciences, 2005, 48 : 125 - 136
  • [8] Visual multi-secret sharing with friendliness
    Jeng F.-G.
    Lin K.-S.
    Lin C.-H.
    Chen T.-H.
    Journal of Shanghai Jiaotong University (Science), 2014, 19 (4) : 455 - 465
  • [9] Linear multi-secret sharing schemes
    XIAO Liangliang & LIU Mulan Academy of Mathematics and System Sciences and Key Laboratory of Mathematics Mechanization
    ScienceinChina(SeriesF:InformationSciences), 2005, (01) : 125 - 136
  • [10] ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism
    Shi, Ruonan
    Chen, Yuling
    Tan, Chaoyue
    Luo, Yun
    Li, Tao
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):