Proactive (k, n) threshold secret sharing scheme with variant k and n

被引:0
|
作者
Wang, Shiuh-Jeng [1 ]
Tsai, Yuh-Ren [1 ]
Chen, Pin-You [1 ]
机构
[1] Cent Police Univ, Dept Informat Management, Tao Yuan 33304, Taiwan
来源
2007 INTERNATIONAL CONFERENCE ON INTELLIGENT PERVASIVE COMPUTING, PROCEEDINGS | 2007年
关键词
threshold secret sharing; proactive secret sharing; sharing polynomial; change threshold;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A secret sharing scheme protects the secret by distributing it to a group of participants (nodes), and it allows for some groups of participants to collaborate together to reconstruct this secret. With regard to the (k, n) threshold scheme, k out of n or more participants can reconstruct the secret. The proactive secret sharing scheme periodically updates the distributed secret (shadow). Based on such a proactive secret sharing scheme, we propose a completely mobile proactive secret sharing scheme, which not only allows for the changing of participant number n, but arbitrarily changes the threshold k.
引用
收藏
页码:117 / 120
页数:4
相关论文
共 50 条
  • [1] On a fast (k,n)-threshold secret sharing scheme
    Kurihara, Jun
    Kiyomoto, Shinsaku
    Fukushima, Kazuhide
    Tanaka, Toshiaki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (09) : 2365 - 2378
  • [2] A new (k, n)-threshold secret sharing scheme and its extension
    Kurihara, Jun
    Kiyomoto, Shinsaku
    Fukushima, Kazuhide
    Tanaka, Toshiaki
    INFORMATION SECURITY, PROCEEDINGS, 2008, 5222 : 455 - 470
  • [3] A verifiable (k, n)-threshold dynamic quantum secret sharing scheme
    Li, Fulin
    Hu, Hang
    Zhu, Shixin
    Yan, Jiayun
    Ding, Jian
    QUANTUM INFORMATION PROCESSING, 2022, 21 (07)
  • [4] A Fast (k, L, n)-Threshold Ramp Secret Sharing Scheme
    Kurihara, Jun
    Kiyomoto, Shinsaku
    Fukushima, Kazuhide
    Tanaka, Toshiaki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (08) : 1808 - 1821
  • [5] Cheating identifiable (k, n) threshold quantum secret sharing scheme
    Yan, Chenhong
    Li, Zhihui
    Liu, Lu
    Lu, Dianjun
    QUANTUM INFORMATION PROCESSING, 2022, 21 (01)
  • [6] A verifiable (k, n)-threshold dynamic quantum secret sharing scheme
    Fulin Li
    Hang Hu
    Shixin Zhu
    Jiayun Yan
    Jian Ding
    Quantum Information Processing, 21
  • [7] Cheating identifiable (k, n) threshold quantum secret sharing scheme
    Chenhong Yan
    Zhihui Li
    Lu Liu
    Dianjun Lu
    Quantum Information Processing, 2022, 21
  • [8] Verifiable quantum (k, n)-threshold secret sharing
    Yu-Guang Yang
    Xin Jia
    Hong-Yang Wang
    Hua Zhang
    Quantum Information Processing, 2012, 11 : 1619 - 1625
  • [9] Verifiable quantum (k, n)-threshold secret sharing
    Yang, Yu-Guang
    Jia, Xin
    Wang, Hong-Yang
    Zhang, Hua
    QUANTUM INFORMATION PROCESSING, 2012, 11 (06) : 1619 - 1625
  • [10] A {k,n}-secret sharing scheme for color images
    Lukac, R
    Plataniotis, KN
    Venetsanopoulos, AN
    COMPUTATIONAL SCIENCE - ICCS 2004, PROCEEDINGS, 2004, 3039 : 72 - 79