Using Ciphertext Policy Attribute Based Encryption for Verifiable Secret Sharing
نویسندگان
چکیده
Threshold secret sharing schemes are used to divide a given secret by a dealer in parts such that no less than the threshold number of shareholders can reconstruct the secret. However, these schemes are susceptible to the malicious behavior of a shareholder or a dealer. To prevent such attacks, it is necessary to make a provision for verification of the integrity of the shares distributed by the dealer. Such verification would ensure fair reconstruction of the secret. In this paper, we present a novel approach for verifiable secret sharing wherein the dealer and the shareholders are not assumed to be honest. Our proposed scheme uses attribute based encryption (ABE) to provide verifiability and for the semantically correct reconstruction of the secret. We call the new protocol as AB-VSS (Attribute Based Verifiable Secret Sharing).
منابع مشابه
Investigating the Approaches for improving the Ciphertext Policy Attribute Based Encryption schemes
Ciphertext policy attribute based encryption (CP-ABE) is a technique in which a user with a secret key (containing attributes) is able to decrypt a message only if the attributes in the policy match those defined in the secret key. The existing methods that use reasonably computable decryption policies for CP-ABE, produce the ciphertext of size at least linearly varying with the number of attri...
متن کاملCiphertext Policy Attribute Based Encryption with Efficient Revocation
Revocation is a vital open problem in almost every cryptosystem dealing with malicious behaviors. In ciphertext policy attribute based encryption, unlike traditional public key cryptosystem, different users may hold the same functional secret keys related with the same attribute set leading to additional difficulties in designing revocation mechanism. In this paper, we propose the ciphertext po...
متن کاملMultiparty Access Control of Ciphertext Sharing in Cloud-Based Online Social Networks
Although current online social networks (OSNs) schemes propose to encrypt data before sharing, the enforcement of access policies over encrypted data has become a challenging task, and the OSNs currently do not provide any mechanism to allow users to update access policies. In this paper, we propose a ciphertext sharing scheme in cloudbased OSNs, which allows the users to outsource encrypted da...
متن کاملHomomorphic-Policy Attribute-Based Key Encapsulation Mechanisms
Attribute-Based Encryption (ABE) allows to target the recipients of a message according to a policy expressed as a predicate among some attributes. Ciphertext-policy ABE schemes can choose the policy at the encryption time. In this paper, we define a new property for ABE: homomorphic-policy. A combiner is able to (publicly) combine ciphertexts under different policies into a ciphertext under a ...
متن کاملCP-ABE with Fine-Grained Access Control and Verifiable Delegation in Cloud Computing
With the growing status of cloud computing, firms and data owners begins to outsource their primary data to the general public cloud for decreased management price and ease of access. Encryption helps to shield user data confidentiality, it makes tricky to perform the comfy undeniable textual content search over the encrypted data Attribute-Based Encryption (ABE) is a shows potential cryptograp...
متن کامل