Dynamic key generations for secret sharing in access structures

被引:0
作者
Lin, CH [1 ]
Lee, W [1 ]
Chen, CS [1 ]
机构
[1] Tunghai Univ, Dept Comp Sci & Infomat Engn, Taichung 407, Taiwan
来源
AINA 2005: 19th International Conference on Advanced Information Networking and Applications, Vol 2 | 2005年
关键词
secret sharing; on-way hash function; access structures; shadows; authorization;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
secret sharing scheme based upon access structures, each group has an authorization and only the participants who stayed in an authorized access structure can recover the secret key. In this paper, we proposed an efficient scheme for secret sharing based upon access structures. We use one-way hash functions to reduce the cost of secret sharing scheme. The presented scheme is easy and efficient, so it is suitable for many real applications.
引用
收藏
页码:127 / 130
页数:4
相关论文
共 8 条
[1]  
BLAKLEY B, 1992, CRYPTO 92
[2]  
Chang C. C., 2004, INT C ADV INF NETW A, V2, P31
[3]  
CHARNES C, 1994, P 2 ACM C COMP COMM, P89
[4]  
*FIPS, 2001, 1802 FIPS
[5]  
LIN HY, 1991, P ASIACRYPTO 91 SPRI, P149
[6]  
SCHNEIER B, 1994, APPL CRYPTOGRAPHY PR, P59
[7]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[8]  
Stinson D.R., 2018, Cryptography: Theory and Practice