A New Secret Sharing Scheme Based on the Multi-Dealer
スポンサーリンク
概要
- 論文の詳細を見る
Almost all the existing secret sharing schemes are based on a single dealer. Maybe in some situations, the secret needs to be maintained by multiple dealers. In this paper, we proposed a novel secret sharing scheme based on the multi-dealer by means of Shamirs threshold scheme and T. Okamoto and S. Uchiyamas public-key cryptosystem. Multiple dealers can commonly maintain the secret and the secret can be dynamically renewed by any dealer. Meanwhile, the reusable secret shadows just needs to be distributed only once. In the secret updated phase, the dealer just needs to publish a little public information instead of redistributing the new secret shadows. Its security is based on the security of Shamirs threshold scheme and the intractability of factoring problem and discrete logarithm problem.
- (社)電子情報通信学会の論文
- 2009-05-01
著者
-
SAKURAI Kouichi
Dept. of Computer Science and Communication Engineering, Kyushu University
-
GUO Cheng
School of Software, Dalian University of Technology
-
LI Mingchu
School of Software, Dalian University of Technology
-
Guo Cheng
School Of Software Dalian University Of Technology
-
Li Mingchu
School Of Software Dalian University Of Technology
-
Sakurai Kouichi
Dept. Of Computer Science And Communication Engineering Kyushu University
関連論文
- ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6
- Analysis of Existing Privacy-Preserving Protocols in Domain Name System
- A New Secret Sharing Scheme Based on the Multi-Dealer
- Analysis of Program Obfuscation Schemes with Variable Encoding Technique
- On Effectiveness of Clock Control in Stream Ciphers(Information Theory and Its Applications)
- Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers(Cryptography and Information Security, Information Theory and Its Applications)
- ESS-FH : Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6
- An Enhanced Security Protocol for Fast Mobile IPv6
- A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6
- A New Secret Sharing Scheme Based on the Multi-Dealer
- Modeling Security Bridge Certificate Authority Architecture
- An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation
- Analysis of Existing Privacy-Preserving Protocols in Domain Name System
- Analysis of Program Obfuscation Schemes with Variable Encoding Technique
- Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party
- Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes
- Enhancing Cooperative Behavior for P2P Reputation Systems by Group Selection (Theoretical Computer Science and Its Applications)
- Efficient Context-Sensitive Intrusion Detection Based on State Transition Table
- A Progress Report on Lattice Based Public-Key Cryptosystems : Theoretical Security versus Practical Cryptanalysis(Special Issue on Algorithm Engineering : Surveys)