A new probabilistic ID-based non-interactive key sharing scheme

被引:0
|
作者
Murakami, Y [1 ]
Sakai, R
Kasahara, M
机构
[1] Kyoto Inst Technol, Dept Elect & Informat Sci, Kyoto 6068585, Japan
[2] Osaka Electrocommun Univ, Dept Lightwave Sci, Neyagawa, Osaka 5728530, Japan
关键词
ID; key sharing; non-interactive; ID-based noninteractive key sharing scheme (ID-NIKS); linear attack; collusion attack;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a new probabilistic ID-based noninteractive key sharing scheme that has non-separable secret-key functions and a non-separable common-key function. The proposed scheme uses the calculation over modulo-P, modulo-Q and over integer ring for realizing non-separability, This proposed scheme has a large threshold against linear attack by the collusive entities.
引用
收藏
页码:2 / 9
页数:8
相关论文
共 50 条
  • [31] Non-interactive verifiable LWE-based multi secret sharing scheme
    Kiamari, Niloofar
    Hadian, Massoud
    Mashhadi, Samaneh
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (14) : 22175 - 22187
  • [32] An ID-based signcryption scheme with compartmented secret sharing for unsigncryption
    Enos, Graham
    Zheng, Yuliang
    INFORMATION PROCESSING LETTERS, 2015, 115 (02) : 128 - 133
  • [33] A new ID-based broadcast encryption scheme
    Yang, Chen
    Cheng, Xiangguo
    Ma, Wenping
    Wang, Xinmei
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 487 - 492
  • [34] A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme
    Jhanwar, Mahabir Prasad
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 273 - 287
  • [35] An ID-Based Key Predistribution Scheme for Wireless Sensor Networks
    Zhang Li-Ping
    Cui Guo-Hua
    Zhang Li-Ping
    Yu Zhi-Gang
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 3617 - +
  • [36] Optimal construction of unconditionally secure ID-based key sharing scheme for large-scale networks
    Hanaoka, G
    Nishioka, T
    Zheng, YL
    Imai, H
    INFORMATION AND COMMUNICATON SECURITY, PROCEEDINGS, 1999, 1726 : 157 - 168
  • [37] An ID-Based Key Predistribution Scheme for Wireless Sensor Networks
    Zhang Li-Ping
    Cui Guo-Hua
    Yu Zhi-Gang
    PROCEEDINGS OF THE 2008 7TH IEEE INTERNATIONAL CONFERENCE ON CYBERNETIC INTELLIGENT SYSTEMS, 2008, : 185 - +
  • [38] Improved ID-based signature scheme solving key escrow
    Dept. of Electronic Eng., Shanghai Jiaotong Univ., Shanghai 200030, China
    J. Shanghai Jiaotong Univ. Sci., 2006, 2 (121-126):
  • [39] Improved ID-Based Signature Scheme Solving Key Escrow
    廖剑
    戚英豪
    黄佩伟
    戎蒙括
    李生红
    JournalofShanghaiJiaotongUniversity(Science), 2006, (02) : 121 - 126
  • [40] An ID-based node key management scheme based on PTPM in MANETs
    Yang, Guang
    Liu, Jiqiang
    Han, Lei
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (15) : 2816 - 2826