Dynamic Threshold Multi-secret Sharing Scheme Using Elliptic Curve and Bilinear Maps

被引:0
|
作者
Wang, Shiuh-Jeng [1 ]
Tsai, Yuh-Ren [2 ]
Shen, Jian-Jhih [2 ]
机构
[1] Cent Police Univ, Dept Informat Management, Tao Yuan 33304, Taiwan
[2] Natl Tsing Hua Univ, Inst Commun Engn, Hsinchu 30013, Taiwan
关键词
Dynamic threshold; verifiable multi-secret scheme; permanent private secret;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper, we propose a dynamic threshold and verifiable multi-secret sharing scheme. Some secrets are protected by distributing them among many participants, whereby only an authorized group of participants can reconstruct the secrets. In our scheme, the secret will change periodically and the dealer will periodically publish some of the information, in addition, the participants can verify the information which they have received. Each participant holds only one permanent, private secret, and some of them use it during different time periods to reconstruct the corresponding shared secrets without revealing their own private information. Because some public information is renewed in our scheme, the old information has nothing to do with the next secret. We also compare our scheme to Chen et al.'s [9] scheme, and we will present some analyses which show that our scheme has smaller storage requirements than the previous scheme.
引用
收藏
页码:883 / +
页数:2
相关论文
共 50 条
  • [21] Multi-secret Threshold Sharing Scheme Based on Chinese Remainder Theorem
    Song, Yinong
    Li, Zichen
    2024 4TH INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING, ICICSE 2024, 2024, : 131 - 135
  • [22] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138
  • [23] An Efficient Verifiable Threshold Multi-Secret Sharing Scheme With Different Stages
    Chen, Dong
    Lu, Wei
    Xing, Weiwei
    Wang, Na
    IEEE ACCESS, 2019, 7 : 107104 - 107110
  • [24] A fully dynamic multi-secret sharing scheme with redundant authorization
    Fulin Li
    Hang Hu
    Shixin Zhu
    Jiayun Yan
    Cryptography and Communications, 2024, 16 : 3 - 20
  • [25] A Multi-level threshold multi-Secret Sharing Scheme with Periodic Renewing
    Zou, Hui
    Wang, Jiandong
    Lu, Fengjia
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL III, 2009, : 371 - 373
  • [26] A fully dynamic multi-secret sharing scheme with redundant authorization
    Li, Fulin
    Hu, Hang
    Zhu, Shixin
    Yan, Jiayun
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2024, 16 (01): : 3 - 20
  • [27] Multi-Secret Sharing Threshold Access Structure
    Reddy, L. Siva
    Prasad, Munaga V. N. K.
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 1585 - 1590
  • [28] An efficient threshold verifiable multi-secret sharing
    Dehkordi, Massoud Hadian
    Mashhadi, Samaneh
    COMPUTER STANDARDS & INTERFACES, 2008, 30 (03) : 187 - 190
  • [29] A NEW VERIFIABLE MULTI-SECRET SHARING SCHEME BASED ON ELLIPTIC CURVES AND PAIRINGS
    Bahramian, Mojtaba
    Eslami, Khadijeh
    ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2019, (41): : 456 - 468
  • [30] Verifiable Threshold Scheme in Multi-Secret Sharing Distributions upon Extensions of ECC
    Shiuh-Jeng Wang
    Yuh-Ren Tsai
    Chien-Chih Shen
    Wireless Personal Communications, 2011, 56 : 173 - 182