A Multi-Secret Reputation Adjustment Method in the Secret Sharing for Internet of Vehicles

被引:1
|
作者
Wu, Jingbang [1 ]
Chen, Xiyu [1 ]
Zhang, Luyuan [1 ]
Zhou, Shufen [1 ]
Wang, Daoshun [2 ]
机构
[1] Beijing Technol & Business Univ, Sch Comp Sci & Engn, Beijing 100048, Peoples R China
[2] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
DATA DISSEMINATION; SECURE; SCHEME; PRIVACY; INFRASTRUCTURE; COMMUNICATION; VANETS;
D O I
10.1155/2022/1413976
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure data sharing for the Internet of Vehicles (IoV) has drawn much attention in developing smart cities and smart transportation. One way to achieve that is based on the reputation of the participant vehicles and the interaction between them. Most of the reputation adjustment schemes are aimed at single-secret situations, and there are cases where shared information leaks after reconstruction; and the shared information of all participants need to be updated again. This paper uses binary asymmetric polynomials to realize the asynchronous reconstruction of secrets, that is, multiple secrets are distributed at once, and each secret is independent of each other when it is restored. Each participant holds the shared divided information part of a one-variable polynomial. When the secret is reconstructed, the shared information part is not directly shown to ensure that the shared information is not leaked. Furthermore, we provide another way to keep the secret unchanged and modify the secret threshold.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] DNA based Multi-Secret Image Sharing
    Anbarasi, L. Jani
    Mala, G. S. Anandha
    Narendra, Modigari
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 1794 - 1801
  • [22] A (t, n) multi-secret sharing scheme
    Yang, CC
    Chang, TY
    Hwang, MS
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 151 (02) : 483 - 490
  • [23] A Hierarchical Threshold Multi-secret Sharing Scheme
    Shi Runhua
    Zhong Hong
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 231 - 234
  • [24] A practical verifiable multi-secret sharing scheme
    Zhao, Jianjie
    Zhang, Jianzhong
    Zhao, Rong
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) : 138 - 141
  • [25] Verifiable threshold multi-secret sharing scheme
    Pang, Liao-Jun
    Li, Hui-Xian
    Li, Zhi-Jie
    Wang, Yu-Min
    Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2008, 40 (09): : 1462 - 1465
  • [26] A New Approach to Weighted Multi-Secret Sharing
    Zou, Xukai
    Maino, Fabio
    Bertino, Elisa
    Sui, Yan
    Wang, Kai
    Li, Feng
    2011 20TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2011,
  • [27] A new (t,n) multi-secret sharing scheme based on Shamir's secret sharing
    Pang, LJ
    Wang, YM
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) : 840 - 848
  • [28] A New Double Layer Multi-Secret Sharing Scheme
    Elavarasi Gunasekaran
    Vanitha Muthuraman
    China Communications, 2024, 21 (01) : 297 - 309
  • [29] Multi-Secret Image Sharing Scheme by Boolean Operations
    Chen, Chien-Chang
    Lin, Cheng-Shian
    Chen, Jia-Zhan
    2022 IEEE 18TH INTERNATIONAL COLLOQUIUM ON SIGNAL PROCESSING & APPLICATIONS (CSPA 2022), 2022, : 397 - 402
  • [30] A New (t, n) Multi-secret Sharing Scheme
    Tan, Xiao-qing
    Wang, Zhi-guo
    ICCEE 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2008, : 861 - +