An unconditionally secure multi-round revocation scheme using secret sharing

被引:0
|
作者
Yang, Ming [1 ]
机构
[1] PLA Univ Sci & Technol, Dept Comp Sci, Nanjing 210007, Peoples R China
来源
TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5 | 2006年
关键词
broadcast encryption; revocation scheme; secret sharing; secure multicast;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The revocation schemes are usually used for broadcast encryption and multicast key management. We present a Shamir's polynomial secret sharing based revocation scheme that enable many revocation rounds and has t(2) revocation capability in each round. Our scheme has some notable properties as compared with the other precious schemes: (1) Our multi-round revocation scheme is unconditionally secure other than computationally secure; (2) Our scheme promotes the revocation capability from t users to t(2) users in every round, and is secure against any coalition of all the revoked users. (3) Each user only restores the constant personal keys during the whole session, and the overhead of computation and communication is only dependant on the degree of the secret sharing polynomial regardless of the size of the group.
引用
收藏
页码:630 / 635
页数:6
相关论文
共 50 条
  • [1] An unconditionally secure multi-round revocation scheme using secret sharing
    Yang, M
    PROCEEDINGS OF THE THIRD IASTED INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND COMPUTER NETWORKS, 2005, : 31 - 37
  • [2] Unconditionally secure social secret sharing scheme
    Nojoumian, M.
    Stinson, D. R.
    Grainger, M.
    IET INFORMATION SECURITY, 2010, 4 (04) : 202 - 211
  • [3] A secure multi-round electronic auction scheme
    Liu, SL
    Wang, CJ
    Wang, YM
    IEEE/AFCEA EUROCOMM 2000, CONFERENCE RECORD: INFORMATION SYSTEMS FOR ENHANCED PUBLIC SAFETY AND SECURITY, 2000, : 330 - 334
  • [4] UNCONDITIONALLY SECURE FAIR (t, n)-SECRET SHARING SCHEME
    Al Mahmoud, Qassim
    Besoul, Khaldoun
    Alhalaybeh, Ayman
    ADVANCES AND APPLICATIONS IN DISCRETE MATHEMATICS, 2023, 38 (01): : 127 - 143
  • [5] Unconditionally secure proactive secret sharing scheme with combinatorial structures
    Stinson, DR
    Wei, R
    SELECTED AREAS IN CRYPTOGRAPHY, PROCEEDINGS, 2000, 1758 : 200 - 214
  • [6] Key management for secure multicast communication using secret sharing-based revocation scheme
    Liu, XX
    Yang, M
    Wang, XK
    INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2005, VOLS 1 AND 2, PROCEEDINGS, 2005, : 1262 - 1266
  • [7] Providing Anonymity in Unconditionally Secure Secret Sharing Schemes
    Mida Guillermo
    Keith M. Martin
    Christine M. O'Keefe
    Designs, Codes and Cryptography, 2003, 28 : 227 - 245
  • [8] Providing anonymity in unconditionally secure secret sharing schemes
    Guillermo, M
    Martin, KM
    O'Keefe, CM
    DESIGNS CODES AND CRYPTOGRAPHY, 2003, 28 (03) : 227 - 245
  • [9] SSeCloud: Using secret sharing scheme to secure keys
    Hu, Liang
    Huang, Yang
    Yang, Disheng
    Zhang, Yuzhen
    Liu, Hengchang
    2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, ENERGY TECHNOLOGY AND ENVIRONMENTAL ENGINEERING (MSETEE 2017), 2017, 81
  • [10] Resource Sharing Through Multi-Round Matchings
    Trabelsi, Yohai
    Adiga, Abhijin
    Kraus, Sarit
    Ravi, S. S.
    Rosenkrantz, Daniel J.
    THIRTY-SEVENTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 37 NO 10, 2023, : 11681 - 11690