A collaborative secret sharing scheme based on the Chinese Remainder Theorem

被引:9
|
作者
Jia, Xingxing [1 ]
Song, Yixuan [1 ]
Wang, Daoshun [2 ]
Nie, Daxin [1 ]
Wu, Jinzhao [3 ]
机构
[1] Lanzhou Univ, Sch Math & Stat, Lanzhou 730000, Gansu, Peoples R China
[2] Tsinghua Univ, Sch Comp, Beijing 100084, Peoples R China
[3] Guangxi Univ Nationalities, Sch Software, Guangxi 530006, Peoples R China
关键词
group collaboration; collaborative secret sharing; Chinese Remainder Theorem; secret sharing; ENCRYPTION;
D O I
10.3934/mbe.2019062
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
Secret sharing (SS) can be used as an important group key management technique for distributed cloud storage and cloud computing. In a traditional threshold SS scheme, a secret is shared among a number of participants and each participant receives one share. In many real-world applications, some participants are involved in multiple SS schemes with group collaboration supports thus have more privileges than the others. To address this issue, we could assign multiple shares to such participants. However, this is not a bandwidth efficient solution. Therefore, a more sophisticated mechanism is required. In this paper, we propose an efficient collaborative secret sharing (CSS) scheme specially tailored for multi-privilege participants in group collaboration. The CSS scheme between two or among more SS schemes is constructed by rearranging multi-privilege participants in each participant set and then formulated into several independent SS schemes with multi-privilege shares that precludes information leakage. Our scheme is based on the Chinese Remainder Theorem with lower recovery complexity and it allows each multi-privilege participant to keep only one share. It can be formally proved that our scheme achieves asymptotically perfect security. The experimental results demonstrate that it is efficient to achieve group collaboration, and it has computational advantages, compared with the existing works in the literature.
引用
收藏
页码:1280 / 1299
页数:20
相关论文
共 50 条
  • [41] Single Secret Sharing Scheme Using Chinese Remainder Theorem, Modified Shamir’s Scheme and XOR Operation
    Dinesh Pande
    Arjun Singh Rawat
    Maroti Deshmukh
    Maheep Singh
    Wireless Personal Communications, 2023, 130 : 957 - 985
  • [42] Single Secret Sharing Scheme Using Chinese Remainder Theorem, Modified Shamir's Scheme and XOR Operation
    Pande, Dinesh
    Rawat, Arjun Singh
    Deshmukh, Maroti
    Singh, Maheep
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 130 (02) : 957 - 985
  • [43] Grouped Secret Sharing Schemes Based on Lagrange Interpolation Polynomials and Chinese Remainder Theorem
    Miao, Fuyou
    Yu, Yue
    Meng, Keju
    Xiong, Yan
    Chang, Chin-Chen
    Security and Communication Networks, 2021, 2021
  • [44] Weighted Secret Image Sharing for a (k, n) Threshold Based on the Chinese Remainder Theorem
    Tan, Longdan
    Lu, Yuliang
    Yan, Xuehu
    Liu, Lintao
    Li, Longlong
    IEEE ACCESS, 2019, 7 : 59278 - 59286
  • [45] Authenticable dynamic quantum multi-secret sharing based on the Chinese remainder theorem
    Lele Li
    Zhaowei Han
    Zhihui Li
    Feiting Guan
    Li Zhang
    Quantum Information Processing, 23
  • [46] A (k, n) multi-secret image sharing scheme based on Chinese remainder theorem and Arnold cat map
    Chanu, Oinam B.
    Neelima, Arambam
    JOURNAL OF ELECTRONIC IMAGING, 2021, 30 (02)
  • [47] Chinese Remainder Theorem-Based RSA-Threshold Cryptography in MANET Using Verifiable Secret Sharing Scheme
    Sarkar, S.
    Kisku, B.
    Misra, S.
    Obaidat, M. S.
    2009 IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, 2009, : 258 - +
  • [48] Grouped Secret Sharing Schemes Based on Lagrange Interpolation Polynomials and Chinese Remainder Theorem
    Miao, Fuyou
    Yu, Yue
    Meng, Keju
    Xiong, Yan
    Chang, Chin-Chen
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [49] General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting
    Iftene, Sorin
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 186 (67-84) : 67 - 84
  • [50] Practical attacks on a class of secret image sharing schemes based on Chinese Remainder Theorem
    Sahoo, Suraj Kumar
    Adhikari, Avishek
    Dutta, Sabyasachi
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 100