Skip to main content
Erschienen in: Cryptography and Communications 1/2024

08.11.2022

A fully dynamic multi-secret sharing scheme with redundant authorization

verfasst von: Fulin Li, Hang Hu, Shixin Zhu, Jiayun Yan

Erschienen in: Cryptography and Communications | Ausgabe 1/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Based on Shamir’s threshold scheme and Elliptic curve cryptography, a fully dynamic multi-secret sharing scheme with redundant authorization is proposed for the general access structure. In the proposed scheme, during the secret recovery phase, each participant who recovers the shared secrets must obtain the redundant authorization, which is constructed by the secret dealer. The access structure can be changed and the number of participants can be increased (decreased) when the shared secrets are changed, while the share of each participant does not need to change. In addition, multiple secrets (s secrets) can be securely shared when each participant needs to hold only one share, and the s secrets can be recovered based on the threshold k. Moreover, compared with the existing dynamic schemes, our scheme has the following characteristics: 1) It is fully dynamic; 2) When the number of shared secrets satisfies the condition \(s>k+5\), each shared secret requires less average storage space; 3) It can ensure that the secret dealer knows the status of secret sharing.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Blakley, G.R.: Safeguarding cryptographic keys. IEEE Computer Society, 313–317 (1979) Blakley, G.R.: Safeguarding cryptographic keys. IEEE Computer Society, 313–317 (1979)
3.
Zurück zum Zitat Yang. Y.H., Du. W.Z.: Secret Sharing Scheme Based on Chinese Remainder Theorem in Cloud Computing. In: 4th International Conference on Mechanical, Control and Computer Engineering, pp. 618–621 (2019) Yang. Y.H., Du. W.Z.: Secret Sharing Scheme Based on Chinese Remainder Theorem in Cloud Computing. In: 4th International Conference on Mechanical, Control and Computer Engineering, pp. 618–621 (2019)
4.
Zurück zum Zitat Chilwant, R.B., Sarvagod, T.S, Kumbhar, K. R., et al.: SISA: A secret-sharing scheme application for cloud environment. In: 2019 International Conference on Communication and Electronics Systems (ICCES), pp. 638–643 (2019) Chilwant, R.B., Sarvagod, T.S, Kumbhar, K. R., et al.: SISA: A secret-sharing scheme application for cloud environment. In: 2019 International Conference on Communication and Electronics Systems (ICCES), pp. 638–643 (2019)
5.
Zurück zum Zitat Raman, R.K., Varshney, L.R.: Distributed Storage Meets Secret Sharing on the Blockchain. In: 2018 Information Theory and Applications Workshop (ITA), pp. 1–6 (2018) Raman, R.K., Varshney, L.R.: Distributed Storage Meets Secret Sharing on the Blockchain. In: 2018 Information Theory and Applications Workshop (ITA), pp. 1–6 (2018)
6.
Zurück zum Zitat Chene, H.F., Wu, H.L., Chang, C.C., et al.: Light repository blockchain system with multisecret sharing for industrial big data. Security and Communication Networks (2019) Chene, H.F., Wu, H.L., Chang, C.C., et al.: Light repository blockchain system with multisecret sharing for industrial big data. Security and Communication Networks (2019)
7.
Zurück zum Zitat Ito, M., Saito, A., Nishizeki, T.: Secret sharing scheme realizing general access structure, GLOBECOM Tokyo’87. IEEE/IECE Global Telecommunications Conference 1987(1), 99–102 (1987) Ito, M., Saito, A., Nishizeki, T.: Secret sharing scheme realizing general access structure, GLOBECOM Tokyo’87. IEEE/IECE Global Telecommunications Conference 1987(1), 99–102 (1987)
8.
Zurück zum Zitat Benaloh, J., Leichter, J.: Generalized secret sharing and monotone functions. Advances in Cryptology-CRYPTO ’88, 18(1), 27–35 (1990) Benaloh, J., Leichter, J.: Generalized secret sharing and monotone functions. Advances in Cryptology-CRYPTO ’88, 18(1), 27–35 (1990)
9.
Zurück zum Zitat He, J., Dawson, E.: Multistage secret sharing based on one-way function. Electron. Lett. 30(19), 1591–1592 (1994)ADSCrossRef He, J., Dawson, E.: Multistage secret sharing based on one-way function. Electron. Lett. 30(19), 1591–1592 (1994)ADSCrossRef
10.
Zurück zum Zitat Geng, Y.J., Fan, X.H., Hong. F.: A new multi-secret scheme with multi-policy. In: 9th International Conference on Advanced Communication Technology (ICACT 2007), pp. 1515-1517 (2007) Geng, Y.J., Fan, X.H., Hong. F.: A new multi-secret scheme with multi-policy. In: 9th International Conference on Advanced Communication Technology (ICACT 2007), pp. 1515-1517 (2007)
11.
Zurück zum Zitat Shao, J.: Efficient verifiable multi-secret sharing scheme based on hash function. Inform. Sci. 278, 104–109 (2014)MathSciNetCrossRef Shao, J.: Efficient verifiable multi-secret sharing scheme based on hash function. Inform. Sci. 278, 104–109 (2014)MathSciNetCrossRef
12.
Zurück zum Zitat Wang, N., Cai, Y.Y., Fu, J.S., et al.: Information privacy protection based on verifiable (t, n)-threshold multi-secret sharing scheme. IEEE Access 8, 20799–20804 (2020)CrossRef Wang, N., Cai, Y.Y., Fu, J.S., et al.: Information privacy protection based on verifiable (t, n)-threshold multi-secret sharing scheme. IEEE Access 8, 20799–20804 (2020)CrossRef
13.
Zurück zum Zitat Cachin, C.: On-line secret sharing. In: Proceedings of Fifth IMA Conference on Cryptography and Coding, pp. 190–198 (1995) Cachin, C.: On-line secret sharing. In: Proceedings of Fifth IMA Conference on Cryptography and Coding, pp. 190–198 (1995)
14.
Zurück zum Zitat Pinch, R.G.E.: On line multiple secret sharing. Electron. Lett 32(12), 1087–1088 (1996)ADSCrossRef Pinch, R.G.E.: On line multiple secret sharing. Electron. Lett 32(12), 1087–1088 (1996)ADSCrossRef
15.
Zurück zum Zitat Hwang, R.J., Chang, C.C.: An on-line secret sharing scheme for multi-secrets. Comput. Commun. 21(13), 1170–1176 (1998)CrossRef Hwang, R.J., Chang, C.C.: An on-line secret sharing scheme for multi-secrets. Comput. Commun. 21(13), 1170–1176 (1998)CrossRef
16.
Zurück zum Zitat Mashhadi, S., Dehkordi, M.H.: Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem. Inform. Sci. 294, 31–40 (2015)MathSciNetCrossRef Mashhadi, S., Dehkordi, M.H.: Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem. Inform. Sci. 294, 31–40 (2015)MathSciNetCrossRef
17.
Zurück zum Zitat Binu, V.P., Sreekumar, A.: Secure and Efficient Secret Sharing Scheme with General Access Structures Based on Elliptic Curve and Pairing. Wireless Pers. Commun. 92(4), 1531–1543 (2017)CrossRef Binu, V.P., Sreekumar, A.: Secure and Efficient Secret Sharing Scheme with General Access Structures Based on Elliptic Curve and Pairing. Wireless Pers. Commun. 92(4), 1531–1543 (2017)CrossRef
19.
Zurück zum Zitat Chattopadhyay, A.K., Maitra, P., et al.: A verifiable multi-secret sharing scheme with elliptic curve cryptography. In: 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication (IEMCOM), pp. 1374–1379 (2018) Chattopadhyay, A.K., Maitra, P., et al.: A verifiable multi-secret sharing scheme with elliptic curve cryptography. In: 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication (IEMCOM), pp. 1374–1379 (2018)
20.
Zurück zum Zitat Boneh, D.: The decision Diffie-Hellman problem, pp. 48–63. Algorithmic Number Theory. Third International Symposium, ANTS-III Proceedings (1998) Boneh, D.: The decision Diffie-Hellman problem, pp. 48–63. Algorithmic Number Theory. Third International Symposium, ANTS-III Proceedings (1998)
21.
Zurück zum Zitat Beimel, A., Chor, B.: Universally ideal secret-sharing schemes. IEEE Trans. Inf. Theory 40(3), 786–794 (1994)MathSciNetCrossRef Beimel, A., Chor, B.: Universally ideal secret-sharing schemes. IEEE Trans. Inf. Theory 40(3), 786–794 (1994)MathSciNetCrossRef
Metadaten
Titel
A fully dynamic multi-secret sharing scheme with redundant authorization
verfasst von
Fulin Li
Hang Hu
Shixin Zhu
Jiayun Yan
Publikationsdatum
08.11.2022
Verlag
Springer US
Erschienen in
Cryptography and Communications / Ausgabe 1/2024
Print ISSN: 1936-2447
Elektronische ISSN: 1936-2455
DOI
https://doi.org/10.1007/s12095-022-00613-3

Weitere Artikel der Ausgabe 1/2024

Cryptography and Communications 1/2024 Zur Ausgabe

Premium Partner