Access control and signatures via quorum secret sharing

被引:43
|
作者
Naor, M [1 ]
Wool, A
机构
[1] Weizmann Inst Sci, Dept Appl Math & Comp Sci, IL-76100 Rehovot, Israel
[2] Lucent Technol, Bell Labs, Murray Hill, NJ 07974 USA
基金
以色列科学基金会;
关键词
quorum systems; replication; secret sharing; security; cryptography;
D O I
10.1109/71.722223
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We suggest a method of controlling the access to a secure database via quorum systems. A quorum system is a collection of sets (quorums) every two of which have a nonempty intersection. Quorum systems have been used for a number of applications in the area of distributed systems. We propose a separation between access servers, which are protected and trustworthy, but may be outdated, and the data servers, which may all be compromised. The main paradigm is that only the servers in a complete quorum can collectively grant (or revoke) access permission. The method we suggest ensures that, after authorization is revoked, a cheating user Alice will not be able to access the data even if many access servers still consider her authorized and even if the complete raw database is available to her. The method has a low overhead in terms of communication and computation. It can also be converted into a distributed system for issuing secure signatures. An important building block in our method is the use of secret sharing schemes that realize the access structures of quorum systems. We provide several efficient constructions of such schemes which may be of interest in their own right.
引用
收藏
页码:909 / 922
页数:14
相关论文
共 50 条
  • [31] Quantum secret sharing for a general quantum access structure
    Bai, Chen-Ming
    Li, Zhi-Hui
    Si, Meng-Meng
    Li, Yong-Ming
    EUROPEAN PHYSICAL JOURNAL D, 2017, 71 (10):
  • [32] Linear secret sharing schemes and rearrangements of access structures
    Xiao L.-L.
    Liu M.-L.
    Acta Mathematicae Applicatae Sinica, 2004, 20 (4) : 685 - 694
  • [33] Verifiable quantum secret sharing with multi access structures
    Mashhadi, Samaneh
    OPTIK, 2022, 270
  • [34] Quantum secret sharing for a general quantum access structure
    Chen-Ming Bai
    Zhi-Hui Li
    Meng-Meng Si
    Yong-Ming Li
    The European Physical Journal D, 2017, 71
  • [35] A construction for secret sharing scheme with general access structure
    Guo, C. (guo8016@gmail.com), 1600, Ubiquitous International (04):
  • [36] Verifiable quantum secret sharing with multi access structures
    Mashhadi, Samaneh
    Optik, 2022, 270
  • [37] Multi-Secret Sharing Threshold Access Structure
    Reddy, L. Siva
    Prasad, Munaga V. N. K.
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 1585 - 1590
  • [38] Generalized general access structure in secret image sharing
    Yan, Xuehu
    Lu, Yuliang
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2019, 58 : 89 - 101
  • [39] Multiple secret image sharing with general access structure
    Chen, Tzung-Her
    Wu, Xi-Wen
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (19-20) : 13247 - 13265
  • [40] Rearrangements of access structures and their realizations in secret sharing schemes
    Zhang, Zhifang
    Liu, Mulan
    Xiao, Liangliang
    DISCRETE MATHEMATICS, 2008, 308 (21) : 4882 - 4891