Cargando…

Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation

After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing emp...

Descripción completa

Detalles Bibliográficos
Autores principales: Yuan, Lifeng, Li, Mingchu, Guo, Cheng, Choo, Kim-Kwang Raymond, Ren, Yizhi
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2016
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5085248/
https://www.ncbi.nlm.nih.gov/pubmed/27792784
http://dx.doi.org/10.1371/journal.pone.0165512
_version_ 1782463538924617728
author Yuan, Lifeng
Li, Mingchu
Guo, Cheng
Choo, Kim-Kwang Raymond
Ren, Yizhi
author_facet Yuan, Lifeng
Li, Mingchu
Guo, Cheng
Choo, Kim-Kwang Raymond
Ren, Yizhi
author_sort Yuan, Lifeng
collection PubMed
description After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t′, n) and ({t(1), t(2),⋯, t(N)}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely.
format Online
Article
Text
id pubmed-5085248
institution National Center for Biotechnology Information
language English
publishDate 2016
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-50852482016-11-04 Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation Yuan, Lifeng Li, Mingchu Guo, Cheng Choo, Kim-Kwang Raymond Ren, Yizhi PLoS One Research Article After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t′, n) and ({t(1), t(2),⋯, t(N)}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely. Public Library of Science 2016-10-28 /pmc/articles/PMC5085248/ /pubmed/27792784 http://dx.doi.org/10.1371/journal.pone.0165512 Text en © 2016 Yuan et al http://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
spellingShingle Research Article
Yuan, Lifeng
Li, Mingchu
Guo, Cheng
Choo, Kim-Kwang Raymond
Ren, Yizhi
Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation
title Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation
title_full Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation
title_fullStr Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation
title_full_unstemmed Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation
title_short Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation
title_sort novel threshold changeable secret sharing schemes based on polynomial interpolation
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5085248/
https://www.ncbi.nlm.nih.gov/pubmed/27792784
http://dx.doi.org/10.1371/journal.pone.0165512
work_keys_str_mv AT yuanlifeng novelthresholdchangeablesecretsharingschemesbasedonpolynomialinterpolation
AT limingchu novelthresholdchangeablesecretsharingschemesbasedonpolynomialinterpolation
AT guocheng novelthresholdchangeablesecretsharingschemesbasedonpolynomialinterpolation
AT chookimkwangraymond novelthresholdchangeablesecretsharingschemesbasedonpolynomialinterpolation
AT renyizhi novelthresholdchangeablesecretsharingschemesbasedonpolynomialinterpolation