Ideal social secret sharing using Birkhoff interpolation method

نویسندگان

  • Ziba Eslami
  • Nasrollah Pakniat
  • Mehrdad Nojoumian
چکیده

The concept of social secret sharing was introduced in 2010 by Nojoumian et al. In Nojoumian et al.’s scheme (called SSS), the number of shares allocated to each party depends on the player’s reputation and the way he interacts with other parties. In other words, weights of the players are periodically adjusted such that cooperative participants receive more shares compared to non-cooperative parties. As our contribution, we propose an ideal social secret sharing (Ideal-SSS) in which the size of each player’s share is equal to the size of the secret. This property will be achieved using hierarchical threshold secret sharing. We show that the proposed scheme is secure in a passive adversary model. Compared to SSS, our proposed scheme is more efficient in terms of the share size, communication complexity and computational complexity of the “sharing” protocol. However, the “social tuning” and “reconstruction” protocols of SSS are computationally more efficient than those of the proposed scheme. Depending on the number of execution of social tuning protocol, this might be a reasonable compromise because the reconstruction protocol is executed only once throughout the secret’s lifetime. Copyright c ⃝ 2010 John Wiley & Sons, Ltd.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hierarchial Secret Sharing in Ad Hoc Networks through Birkhoff Interpolation

Securing ad hoc networks represents a challenging issue, related to their very characteristics of decentralized architecture, low-complexity, and multiple hops communications. Even if several methods are available, this paper presents a novel approach to allow secret sharing of information at lower levels of the node protocol stack. In fact, secret sharing schemes provide a natural way of addre...

متن کامل

Dynamic and Verifiable Hierarchical Secret Sharing

In this work we provide a framework for dynamic secret sharing and present the first dynamic and verifiable hierarchical secret sharing scheme based on Birkhoff interpolation. Since the scheme is dynamic it allows, without reconstructing the message distributed, to add and remove shareholders, to renew shares, and to modify the conditions for accessing the message. Furthermore, each shareholder...

متن کامل

Secret image sharing scheme with hierarchical threshold access structure

A hierarchical threshold secret image sharing (HTSIS) scheme is a method to share a secret image among a set of participants with different levels of authority. Recently, Guo et al. (2012) [22] proposed a HTSIS scheme based on steganography and Birkhoff interpolation. However, their scheme does not provide the required secrecy needed for HTSIS schemes so that some non-authorized subsets of part...

متن کامل

Performing Computations on Hierarchically Shared Secrets

Hierarchical secret sharing schemes distribute a message to a set of shareholders with different reconstruction capabilities. In distributed storage systems, this is an important property because it allows to grant more reconstruction capability to better performing storage servers and vice versa. In particular, Tassa’s conjunctive and disjunctive hierarchical secret sharing schemes are based o...

متن کامل

Innovative Methodologies for Secure Multimedia Communications Using Birkhoff Polynomial Interpolation

Security of multimedia communications is regarded by both academy and industry research as one of the most important and urgent problems of the last decades. In order to improve existing solutions, we propose a framework based on Birkhoff polynomial interpolation. Such new mathematical tool based on this theory improves the classical secret sharing scheme based on Lagrange interpolation widely ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Security and Communication Networks

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2014