A secret sharing scheme with general access structures and its applications

被引:0
作者
Sang Y. [1 ]
Zeng J. [2 ]
Li Z. [3 ]
You L. [1 ]
机构
[1] School of Telecommunication Engineering, Hangzhou Dianzi University
[2] School of Mathematical Sciences, Xiamen University
[3] Information science and technology college, Chengdu University
关键词
Bilinear pairings; Key issuing protocol; Long term key pair; Secret sharing;
D O I
10.4156/ijact.vol3.issue4.13
中图分类号
学科分类号
摘要
A new secret sharing scheme with general access structures was constructed, which works under certificateless scenarios. This secret sharing scheme can also be realized under PKI or ID-based scenarios. In this scheme, the dealer need not send any secret information to participants. The shared secret, the participant set and the access structure can be changed dynamically without updating any participant's long term key pair and secret shadow. The degree of the used Lagrange interpolation polynomial is only one, which makes the computational complexity of the proposed scheme very low. The proposed scheme has advantages over the existing schemes and thus provides great capabilities for many applications. We also gave an application instance of the secret sharing schemecertificateless multi-KGC key issuing protocol.
引用
收藏
页码:121 / 128
页数:7
相关论文
共 18 条
[1]  
Shamir A., How to Share a Secret, Communications of the ACM, 22, pp. 612-613, (1979)
[2]  
Blakley G., Safeguarding Cryptographic Keys, 48, pp. 313-317, (1979)
[3]  
Benaloh J., Leichter J., Generalized Secret Sharing and Monotone Functions, 403, pp. 27-35, (1988)
[4]  
Hwang R.-J., Chang C.-C., An On-line Secret Sharing Scheme for Multi-secrets, Computer Communications, 21, 13, pp. 1170-1176, (1998)
[5]  
Pang L.-J., Li H.-X., Wang Y.-M., A Secure and Efficient Secret Sharing Scheme With General Access Structures, 4223, pp. 646-649, (2006)
[6]  
Al-Riyami S.S., Paterson K.G., Certificateless Public Key Cryptography, 2894, pp. 452-474, (2003)
[7]  
Shamir A., Identity-based Cryptosystems and Signature Schemes, 196, pp. 47-53, (1984)
[8]  
Boneh D., Franklin M., Identity-based Encryption From the Weil Pairing, 2139, pp. 213-229, (2001)
[9]  
Adams C., Lloyd S., Understanding Public-Key Infrastructure--Concepts, Standards, and Deployment Considerations, Indianapolis, (1999)
[10]  
Sang Y., You L., A New Certificateless Self-identifiable Ring Signature Scheme, 7, pp. 2816-2819, (2010)