Combinatorial repairability for threshold schemes
نویسندگان
چکیده
In this paper, we consider methods whereby a subset of players in a (k, n)-threshold scheme can “repair” another player’s share in the event that their share has been lost or corrupted. This will take place without the participation of the dealer who set up the scheme. The repairing protocol should not compromise the (unconditional) security of the threshold scheme, and it should be efficient, where efficiency is measured in terms of the amount of information exchanged during the repairing process. We study two approaches to repairing. The first method is based on the “enrollment protocol” from [9] which was originally developed to add a new player to a threshold scheme (without the participation of the dealer) after the scheme was set up. The second method distributes “multiple shares” to each player, as defined by a suitable combinatorial design. This method results in larger shares, but lower communication complexity, as compared to the first method.
منابع مشابه
Recent results on combinatorial constructions for threshold schemes
A perfect (t, w, v; m)-threshold scheme is a type of combinatorial design that provides a way of distributing partial information (chosen from a set of v points called shadows) to w participants, so that any t of them can easily calculate one of m possible keys, but no subset of fewer than t participants can determine any partial information regarding the key. In this paper, we give a survey of...
متن کاملA combinatorial interpretation of ramp schemes
Ramp schemes are means by which a (large) secret can be shared among a group of participants in such a way that only sets of at least k participants can reconstruct the secret and the amount of information that of less than k participants can obtain is strictly controlled. This is of the concept of a threshold scheme. The current theory concerning ramp schemes will be here alongside some new re...
متن کاملA combinatorial characterization of regular anonymous perfect threshold schemes
The notion of a regular anonymous perfect threshold scheme is introduced, and a combinatorial characterization for such a (2,w)-threshold scheme in terms of a regular difference family is given. 2002 Elsevier Science B.V. All rights reserved.
متن کاملA Deterministic Multiple Key Space Scheme for Wireless Sensor Networks via Combinatorial Designs
The establishing of a pairwise key between two nodes for encryption in a wireless sensor network is a challenging issue. To do this, we propose a new deterministic key pre-distribution scheme which has modified the multiple key space scheme (MKSS). In the MKSS, the authors define two random parameters to make better resilience than existing schemes. Instead of a random selection of these parame...
متن کاملCharacterization of diagnosability and repairability for self-healing Web Services
Executive Summary This deliverable reports on Task 5.1. It analyses the requirements for self-healability and foresees the implications on the design of Web Services, comparing to how Web Services are designed today. Starting from the concepts of diagnosability and repairability, it provides a characterization of self-healability that builds upon coupling the two later. The different faults, ob...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Des. Codes Cryptography
دوره 86 شماره
صفحات -
تاریخ انتشار 2016