2010 24th IEEE International Conference on Advanced Information Networking and Applications 2010
DOI: 10.1109/aina.2010.56
|View full text |Cite
|
Sign up to set email alerts
|

Collusion Attack Resistance and Practice-Oriented Threshold Changeable Secret Sharing Schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…However, their scheme cannot use standard Shamir's secret reconstruction to recover the secret. Recently, a dealer-free TCSS is proposed by Nojoumian et al [35] and a collusion attack resistance TCSS is proposed by Zhang et al [36]; but both TCSSs need interactions among shareholders in the secret reconstruction. In the next section, we propose a dynamic threshold SS based on a bivariate polynomial.…”
Section: Security Issues In the Secret Reconstructionmentioning
confidence: 99%
“…However, their scheme cannot use standard Shamir's secret reconstruction to recover the secret. Recently, a dealer-free TCSS is proposed by Nojoumian et al [35] and a collusion attack resistance TCSS is proposed by Zhang et al [36]; but both TCSSs need interactions among shareholders in the secret reconstruction. In the next section, we propose a dynamic threshold SS based on a bivariate polynomial.…”
Section: Security Issues In the Secret Reconstructionmentioning
confidence: 99%
“…A dealer-free TCSS is proposed by Nojoumian and Stinson [9] which needs interactions among shareholders in the secret reconstruction. A collusion attack resistance TCSS is proposed by Zhang and He [8] which uses a partial broadcast channel (PBC) in both share distribution phase and secret reconstruction to replace secure channels. However, interactions among shareholders are needed in the secret reconstruction.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, since the changeability of threshold needs to be predicated in advance, this approach is only feasible for some applications when the activity in future secret sharing is predicable. The second approach requires shareholders to work together to refresh shares of a new threshold secret sharing [14,15]. However, this approach needs secure channels to distribute new shares to shareholders.…”
Section: Related Work On Threshold Changeable Secret Sharing (Tcss) mentioning
confidence: 99%
“…We use the following example to explain how to choose the new threshold t′ to meet the requirements of cheater detection and identification. Assume that in Shamir's (7,15) secret-sharing scheme, the secret reconstruction needs to detect and identify at most two cheaters. From Table 1, we can compute the maximal values of the new threshold t′.…”
Section: Determining T′ In Our Designmentioning
confidence: 99%