Ideal and Perfect Secret Sharing for Fault-Tolerant Distributed Access Control of Secure Data via Nondominated Bicoteries
نویسندگان
چکیده
A perfect secret sharing scheme permits a secret to be shared among participants so that only qualified subsets of participants can reconstruct the secret, but any unqualified subset has absolutely no information about the secret. In this paper, we first show that the general secret sharing scheme with a coterie access structure is perfect if the coterie is nondominated (ND). We then propose a perfect secret sharing scheme with an ND bicoterie access structure for the access control of secure data. The proposed scheme has the merits of having two types of quorums: one type to grant and the other to revoke the access of the secure data. This provides us more flexibility for the distributed access control of the secure data. Since there are a large number of different quorums consisting of few participants, the proposed scheme is fault-tolerant in the sense that it still works even when some participants are not available. We also propose an ideal and perfect secret sharing scheme with an ND grid bicoterie access structure. The proposed scheme is optimal (ideal) in the sense that its shares have the same
منابع مشابه
Computationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملA New Approach for Fault Tolerant and Secure Distributed Storage
Fault-tolerant and secure data storage is an essential requirement in any dependable system. We consider the case where a fault-tolerant and secure data storage service is provided by a set of storage servers. Fault tolerance / security for such a storage service is characterized by three attributes availability, integrity, and confidentiality. Availability and integrity are achieved by using m...
متن کاملProbabilistic Verifiable Secret Sharing Tolerating Adaptive Adversary
In this work we focus on two basic secure distributed computation tasksProbabilistic Weak Secret Sharing (PWSS) and Probabilistic Verifiable Secret Sharing (PVSS). PVSS allows a dealer to share a secret among several players in a way that would later allow a unique reconstruction of the secret with negligible error probability. PWSS is slightly weaker version of PVSS where the dealer can choose...
متن کاملProbabilistic Verifiable Secret Sharing Tolerating Adaptive Adversary
In this work, we focus on two basic secure distributed computation tasksProbabilistic WeakSecret Sharing (PWSS) and Probabilistic Verifiable Secret Sharing (PVSS). PVSS allows a dealerto share a secret among several players in a way that would later allow a unique reconstruction ofthe secret with negligible error probability. PWSS is slightly weaker version of PVSS where thedeal...
متن کاملAn Efficient Threshold Verifiable Multi-Secret Sharing Scheme Using Generalized Jacobian of Elliptic Curves
In a (t,n)-threshold secret sharing scheme, a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together, but no group of fewer than t participants can do. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao, and the intractability of the elliptic curve discrete logar...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006