Efficient multistage secret sharing scheme using bilinear map

被引:15
作者
Fatemi, Mitra [1 ,2 ]
Ghasemi, Reza [3 ]
Eghlidos, Taraneh [4 ]
Aref, Mohammad Reza [1 ]
机构
[1] Sharif Univ Technol, Dept Elect Engn, Tehran, Iran
[2] Ecole Polytech Fed Lausanne, Sch Elect Engn, CH-1015 Lausanne, Switzerland
[3] Sharif Univ Technol, Dept Math Sci, Tehran, Iran
[4] Sharif Univ Technol, Elect Res Inst, Tehran, Iran
关键词
Security of data - Recovery;
D O I
10.1049/iet-ifs.2013.0046
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a multistage secret sharing (MSSS) scheme, the authorised subsets of participants could recover a number of secrets in different stages. A one-stage multisecret sharing (OSMSS) scheme is a special case of MSSS schemes in which all the secrets are recovered simultaneously. In these schemes, in addition to the individual shares, the dealer should provide the participants with a number of public values associated with the secrets. The less the number of public values, the more efficient is the scheme. It is desired that the MSSS and OSMSS schemes provide computational security. In this study, the authors show that in the OSMSS schemes any unauthorised coalition of the participants can reduce the uncertainty of the secrets. In addition, in MSSS schemes recovering a secret causes reducing uncertainty of the unrecovered secrets. Furthermore, by introducing a new multi-use MSSS scheme based on weil pairing, they reduce the number of public values comparing with the previous schemes.
引用
收藏
页码:224 / 229
页数:6
相关论文
共 35 条
[1]  
[Anonymous], 2006, Elements of Information Theory
[2]  
[Anonymous], INT J NETW SECUR
[3]   Updating the parameters of a threshold scheme by minimal broadcast [J].
Barwick, SG ;
Jackson, WA ;
Martin, KM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (02) :620-633
[4]  
BENALOH J, 1990, LECT NOTES COMPUT SC, V403, P27
[5]  
Blakley G.R., 1979, INT WORKSH MAN REQ K, DOI [10.1109/MARK.1979.8817296, DOI 10.1109/MARK.1979.8817296]
[6]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[7]  
Brickell E. F., 1991, Journal of Cryptology, V4, P123, DOI 10.1007/BF00196772
[8]   THE DETECTION OF CHEATERS IN THRESHOLD SCHEMES [J].
BRICKELL, EF ;
STINSON, DR .
SIAM JOURNAL ON DISCRETE MATHEMATICS, 1991, 4 (04) :502-510
[9]   A scheme for threshold multi-secret sharing [J].
Chan, CW ;
Chang, CC .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) :1-14
[10]  
Chang TY, 2011, INF TECHNOL CONTROL, V40, P246, DOI 10.5755/j01.itc.40.3.633