A Multi-Secret Reputation Adjustment Method in the Secret Sharing for Internet of Vehicles

被引:1
|
作者
Wu, Jingbang [1 ]
Chen, Xiyu [1 ]
Zhang, Luyuan [1 ]
Zhou, Shufen [1 ]
Wang, Daoshun [2 ]
机构
[1] Beijing Technol & Business Univ, Sch Comp Sci & Engn, Beijing 100048, Peoples R China
[2] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
DATA DISSEMINATION; SECURE; SCHEME; PRIVACY; INFRASTRUCTURE; COMMUNICATION; VANETS;
D O I
10.1155/2022/1413976
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure data sharing for the Internet of Vehicles (IoV) has drawn much attention in developing smart cities and smart transportation. One way to achieve that is based on the reputation of the participant vehicles and the interaction between them. Most of the reputation adjustment schemes are aimed at single-secret situations, and there are cases where shared information leaks after reconstruction; and the shared information of all participants need to be updated again. This paper uses binary asymmetric polynomials to realize the asynchronous reconstruction of secrets, that is, multiple secrets are distributed at once, and each secret is independent of each other when it is restored. Each participant holds the shared divided information part of a one-variable polynomial. When the secret is reconstructed, the shared information part is not directly shown to ensure that the shared information is not leaked. Furthermore, we provide another way to keep the secret unchanged and modify the secret threshold.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] Multi-secret sharing threshold visual cryptography scheme
    Yu, Bin
    Xu, Xiaohui
    Fang, Liguo
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 815 - +
  • [32] A generalized multi-secret sharing scheme to identify cheaters
    Huang, Zhi-Xiong
    Li, Qun-Hui
    Wei, Ren-Yong
    Li, Zhi-Yong
    Tiedao Xuebao/Journal of the China Railway Society, 2007, 29 (06): : 52 - 56
  • [33] Verifiable multi-secret sharing based on LFSR sequences
    Hu, Chunqiang
    Liao, Xiaofeng
    Cheng, Xiuzhen
    THEORETICAL COMPUTER SCIENCE, 2012, 445 : 52 - 62
  • [34] A Modified Multi-secret Sharing Visual Cryptography Scheme
    Yu, Bin
    Fu, Zhengxin
    Fang, Liguo
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 912 - 915
  • [35] Efficient collusion resistant multi-secret image sharing
    Mishra, Kapil
    Kavala, Sannihith
    Singh, Satish Kr.
    Nagabhushan, P.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (43-44) : 33233 - 33252
  • [36] Extended Visual Cryptography Scheme for Multi-secret Sharing
    Reddy, L. Siva
    Prasad, Munaga V. N. K.
    PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 249 - 257
  • [37] Secure multi-level threshold multi-secret sharing
    Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China
    Qinghua Daxue Xuebao, 2007, 4 (592-594):
  • [38] Efficient collusion resistant multi-secret image sharing
    Kapil Mishra
    Sannihith Kavala
    Satish Kr. Singh
    P. Nagabhushan
    Multimedia Tools and Applications, 2020, 79 : 33233 - 33252
  • [39] A hierarchical weighted threshold multi-secret sharing scheme
    Chang, CC
    Pan, YP
    Proceedings of the Second International Conference on Information and Management Sciences, 2002, 2 : 333 - 340
  • [40] New results and applications for multi-secret sharing schemes
    Herranz, Javier
    Ruiz, Alexandre
    Saez, German
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 73 (03) : 841 - 864