A New Multi-stage Secret Sharing Scheme for Hierarchical Access Structure with Existential Quantifier
نویسندگان
چکیده
منابع مشابه
Secret image sharing scheme with hierarchical threshold access structure
A hierarchical threshold secret image sharing (HTSIS) scheme is a method to share a secret image among a set of participants with different levels of authority. Recently, Guo et al. (2012) [22] proposed a HTSIS scheme based on steganography and Birkhoff interpolation. However, their scheme does not provide the required secrecy needed for HTSIS schemes so that some non-authorized subsets of part...
متن کاملMulti-Use Multi-Secret Sharing Scheme for General Access Structure
The main aim of this paper is to construct a multi-secret sharing scheme for general access structure in a trusted dealer model using suitable hash function and Lagrange’s interpolation method. Even though, the proposed scheme is a multi-secret and multi-use one, each participant has to carry only one share. The suitable use of collision resistant one way hash function makes the scheme efficien...
متن کاملSequential Secret Sharing as a New Hierarchical Access Structure
Due to the rapid growth of the next generation networking and system technologies, computer networks require new design and management. In this context, security, and more specifically, access structures have been one of the major concerns. As such, in this article, sequential secret sharing (SQS), as an application of dynamic threshold schemes, is introduced. In this new cryptographic primitiv...
متن کاملA Construction for Secret Sharing Scheme with General Access Structure
Many efficient secret sharing schemes for general access structures have been developed in efforts to deal with the problems of multi-party computations (MPC), threshold cryptography, and access control. In this paper, we have proposed a novel secret sharing scheme with general access structures that is based on the key-lock-pair mechanism. In our scheme, the dealer can assess a real situation ...
متن کاملA NEW SECRET SHARING SCHEME ADVERSARY FUZZY STRUCTURE BASED ON AUTOMATA
In this paper,we introduce a new verifiable multi-use multi-secretsharing scheme based on automata and one-way hash function. The scheme has theadversary fuzzy structure and satisfy the following properties:1) The dealer can change the participants and the adversary fuzzy structure without refreshing any participants' real-shadow. 2) The scheme is based on the inversion of weakly invertible fin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Technology and Control
سال: 2021
ISSN: 2335-884X,1392-124X
DOI: 10.5755/j01.itc.50.2.27789