Ideal and Perfect Secret Sharing for Fault-Tolerant Distributed Access Control of Secure Data via Nondominated Bicoteries

نویسندگان

  • Jehn-Ruey Jiang
  • Hsuan Chuang
چکیده

A perfect secret sharing scheme permits a secret to be shared among participants so that only qualified subsets of participants can reconstruct the secret, but any unqualified subset has absolutely no information about the secret. In this paper, we first show that the general secret sharing scheme with a coterie access structure is perfect if the coterie is nondominated (ND). We then propose a perfect secret sharing scheme with an ND bicoterie access structure for the access control of secure data. The proposed scheme has the merits of having two types of quorums: one type to grant and the other to revoke the access of the secure data. This provides us more flexibility for the distributed access control of the secure data. Since there are a large number of different quorums consisting of few participants, the proposed scheme is fault-tolerant in the sense that it still works even when some participants are not available. We also propose an ideal and perfect secret sharing scheme with an ND grid bicoterie access structure. The proposed scheme is optimal (ideal) in the sense that its shares have the same

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

A New Approach for Fault Tolerant and Secure Distributed Storage

Fault-tolerant and secure data storage is an essential requirement in any dependable system. We consider the case where a fault-tolerant and secure data storage service is provided by a set of storage servers. Fault tolerance / security for such a storage service is characterized by three attributes availability, integrity, and confidentiality. Availability and integrity are achieved by using m...

متن کامل

Probabilistic Verifiable Secret Sharing Tolerating Adaptive Adversary

In this work we focus on two basic secure distributed computation tasksProbabilistic Weak Secret Sharing (PWSS) and Probabilistic Verifiable Secret Sharing (PVSS). PVSS allows a dealer to share a secret among several players in a way that would later allow a unique reconstruction of the secret with negligible error probability. PWSS is slightly weaker version of PVSS where the dealer can choose...

متن کامل

Probabilistic Verifiable Secret Sharing Tolerating Adaptive Adversary

In this work, we focus on two basic secure distributed computation tasksProbabilistic WeakSecret Sharing (PWSS) and Probabilistic Verifiable Secret Sharing (PVSS). PVSS allows a dealerto share a secret among several players in a way that would later allow a unique reconstruction ofthe secret with negligible error probability. PWSS is slightly weaker version of PVSS where thedeal...

متن کامل

An Efficient Threshold Verifiable Multi-Secret Sharing Scheme Using Generalized Jacobian of Elliptic Curves

‎In a (t,n)-threshold secret sharing scheme‎, ‎a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together‎, ‎but no group of fewer than t participants can do‎. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao‎, ‎and the intractability of the elliptic curve discrete logar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006