scispace - formally typeset
Journal ArticleDOI

A unified approach to secret sharing schemes with low distribution cost

Hung-Yu Chien, +2 more
- 01 Sep 2002 - 
- Vol. 25, Iss: 6, pp 723-733
Reads0
Chats0
TLDR
A unified approach for both threshold‐based schemes and generalized group‐oriented cryptosystems is proposed, which requires much less overhead than its counterparts when various secret sharing problems are simultaneously involved.
Abstract
In secret sharing schemes, the secret holder has to distribute secret shares to each participant before distributing the secrets. To distribute or redistribute shares is a very costly process with respect to both time and resources. Unlike previous works, where different approaches are proposed for different scenarios, we propose a unified approach for both threshold‐based schemes and generalized group‐oriented cryptosystems. This unified implementation has the following merits: (1) With a unified approach, the implementation requires much less overhead than its counterparts when various secret sharing problems are simultaneously involved; (2) The Secret Holder (SD) does not need to redistribute new secret shares after the secret reconstruction; (3) The SD can, dynamically and efficiently, determine the capacities (weight) of each user on recovering the secrets, and the threshold values of the secrets; (4) To dynamically adjust the capacities of users, the SD does not need to refresh the shadow o...

read more

Citations
More filters
Journal ArticleDOI

ECC-based lightweight authentication protocol with untraceability for low-cost RFID

TL;DR: A new RFID authentication protocol based on Error Correction Codes (ECC) is proposed that has excellent performance in terms of security, efficiency, server's maintenance, robustness, and cost.
Journal ArticleDOI

A pairing-based publicly verifiable secret sharing scheme

TL;DR: The authors prove that the proposed scheme is a secure PVSS scheme using the random oracle model and under the bilinear Diffie-Hellman assumption.
Journal ArticleDOI

Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices

TL;DR: This paper delicately combine Rabin cryptosystem and error correction codes to design lightweight authentication scheme with anonymity and un-traceability, which is attractive to low-end devices, especially those low-cost cryptographic RFIDs.
Journal Article

A Publicly Verifiable Secret Sharing Scheme Based on Multilinear Diffie-Hellman Assumption.

TL;DR: The performance analysis results show the publicly verifiability, security and practicality of the PVSS scheme in the random oracle and under MDH assumption and it can meet those high efficiency and security of the communication requirements of the application scenarios.
Journal ArticleDOI

On the security of several Gen2-based protocols without modifying the standards

TL;DR: It is argued that modifying or enhancing the standards would be necessary to secure Gen2-based protocols, and this observation coincides with the report from the European Union bridge project.
References
More filters
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Journal ArticleDOI

A public key cryptosystem and a signature scheme based on discrete logarithms

TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
Journal ArticleDOI

Password authentication with insecure communication

TL;DR: A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system.
Book

Cryptography and data security

TL;DR: The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to operating systems, database systems, and computer networks.

Safeguarding cryptographic keys

TL;DR: Certain cryptographic keys, such as a number which makes it possible to compute the secret decoding exponent in an RSA public key cryptosSystem,1,5 or the system master key and certain other keys in a DES cryptosystem,3 are so important that they present a dilemma.