Cargando…
Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation
After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing emp...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2016
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5085248/ https://www.ncbi.nlm.nih.gov/pubmed/27792784 http://dx.doi.org/10.1371/journal.pone.0165512 |
_version_ | 1782463538924617728 |
---|---|
author | Yuan, Lifeng Li, Mingchu Guo, Cheng Choo, Kim-Kwang Raymond Ren, Yizhi |
author_facet | Yuan, Lifeng Li, Mingchu Guo, Cheng Choo, Kim-Kwang Raymond Ren, Yizhi |
author_sort | Yuan, Lifeng |
collection | PubMed |
description | After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t′, n) and ({t(1), t(2),⋯, t(N)}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely. |
format | Online Article Text |
id | pubmed-5085248 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2016 |
publisher | Public Library of Science |
record_format | MEDLINE/PubMed |
spelling | pubmed-50852482016-11-04 Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation Yuan, Lifeng Li, Mingchu Guo, Cheng Choo, Kim-Kwang Raymond Ren, Yizhi PLoS One Research Article After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t′, n) and ({t(1), t(2),⋯, t(N)}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely. Public Library of Science 2016-10-28 /pmc/articles/PMC5085248/ /pubmed/27792784 http://dx.doi.org/10.1371/journal.pone.0165512 Text en © 2016 Yuan et al http://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. |
spellingShingle | Research Article Yuan, Lifeng Li, Mingchu Guo, Cheng Choo, Kim-Kwang Raymond Ren, Yizhi Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation |
title | Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation |
title_full | Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation |
title_fullStr | Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation |
title_full_unstemmed | Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation |
title_short | Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation |
title_sort | novel threshold changeable secret sharing schemes based on polynomial interpolation |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5085248/ https://www.ncbi.nlm.nih.gov/pubmed/27792784 http://dx.doi.org/10.1371/journal.pone.0165512 |
work_keys_str_mv | AT yuanlifeng novelthresholdchangeablesecretsharingschemesbasedonpolynomialinterpolation AT limingchu novelthresholdchangeablesecretsharingschemesbasedonpolynomialinterpolation AT guocheng novelthresholdchangeablesecretsharingschemesbasedonpolynomialinterpolation AT chookimkwangraymond novelthresholdchangeablesecretsharingschemesbasedonpolynomialinterpolation AT renyizhi novelthresholdchangeablesecretsharingschemesbasedonpolynomialinterpolation |