A Novel Verifiable Dynamic Multi-Policy Secret Sharing Scheme

被引:0
|
作者
Wang, Feng [1 ,2 ,3 ,4 ]
Gu, Lize [1 ,2 ,3 ,4 ]
Zheng, Shihui [1 ,2 ,3 ,4 ]
Yang, Yixian [1 ,2 ,3 ,4 ]
Hu, Zhengming [1 ,2 ,3 ,4 ]
机构
[1] Beijing Univ Posts & Telecommun, Informat Secur Ctr, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, MOE, Key Lab Network & Informat Attack & Def Technol, Beijing 100876, Peoples R China
[3] Natl Engn Lab Disaster Backup & Recovery, Beijing 100876, Peoples R China
[4] Beijing Univ Posts & Telecommun, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
verifiable; dynamic; multi-policy; key management; threshold;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Most verifiable multi-secret sharing schemes can not distinguish the security classification because of having the common drawback of sharing secrets with the same threshold value. In order to withstand the problem, a novel verifiable dynamic multi-policy secret sharing scheme is proposed, in which the dealer can freely give any sets of group secrets for sharing according to the different threshold values, and the shadows held by the participants are not only reusable but also verifiable. The proposed scheme provides efficient solutions against the malicious dealer and participants. Moreover, the proposed scheme can add new participants and new group secrets. Compared to the current secret sharing scheme, the proposed scheme is more flexible and more practical application.
引用
收藏
页码:1474 / 1479
页数:6
相关论文
共 50 条
  • [1] Dynamic threshold changeable multi-policy secret sharing scheme
    Wang, Feng
    Zhou, You-sheng
    Li, Dao-feng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3653 - 3658
  • [2] A new multi-secret sharing scheme with multi-policy
    Geng Yong-Jun
    Fan Xiao-Hong
    Hong Fan
    9th International Conference on Advanced Communication Technology: Toward Network Innovation Beyond Evolution, Vols 1-3, 2007, : 1515 - 1517
  • [3] On Novel Verifiable Multi-Secret Sharing Scheme
    Wang, Jian
    Liu, Yanheng
    Wang, Yanxi
    ADVANCED SCIENCE LETTERS, 2011, 4 (11-12) : 3709 - 3715
  • [4] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138
  • [5] Verifiable multi-use dynamic threshold large secret sharing scheme
    Chang, Li-Wei
    Zheng, Shi-Hui
    Xing, You-Song
    Jin, Lei
    Yang, Yi-Xian
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2015, 38 (05): : 86 - 90
  • [6] Verifiable Rational Multi-secret Sharing Scheme
    Cai, Yongquan
    Luo, Zhanhai
    Yang, Yi
    INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 : 42 - 48
  • [7] A practical verifiable multi-secret sharing scheme
    Zhao, Jianjie
    Zhang, Jianzhong
    Zhao, Rong
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) : 138 - 141
  • [8] Verifiable threshold multi-secret sharing scheme
    Pang, Liao-Jun
    Li, Hui-Xian
    Li, Zhi-Jie
    Wang, Yu-Min
    Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2008, 40 (09): : 1462 - 1465
  • [9] A verifiable multi-secret sharing scheme (VMSS)
    Pang Liaojun
    Li Huixian
    Jiao Licheng
    Wang Yumin
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 749 - +
  • [10] Dynamic and verifiable threshold multi-secret sharing scheme based on bilinear pairings
    Li, Huina
    ICIC Express Letters, 2015, 9 (10): : 2819 - 2825