Proactive secret sharing schemes
WebbAn asymmetric secret sharing scheme (A-SSS) can set the number of servers at less than k, because it makes up to k-1 shares from one key of the owner of the secret. Therefore, the secret is not revealed even if all the servers are attacked. However, when the owner's key is stolen and attacked, shares may be leaked. Therefore, in this paper we propose a … Webb1 feb. 2024 · Proactive secret sharing scheme. The concept of proactive security was introduced by Ostrovsky and Yung in [17], and applied by Herzberg et al. in [9] to secret sharing schemes. In the proactive secret sharing scheme, the lifetime of the secret is divided into periods of time (e.g., a day, one week, etc.).
Proactive secret sharing schemes
Did you know?
Webb31 maj 2013 · The proactive secret sharing is a method to update shares in the secret sharing scheme at irregular intervals. In this paper, a proactive image secret sharing scheme over is proposed for the first time. For the past 30 years, Galois field operation is… Expand View via Publisher koreascience.or.kr:80 Save to LibrarySave Create AlertAlert Cite Webb1 feb. 2024 · In this paper, by using bilinear pairings and monotone span programs we propose two practical publicly verifiable secret sharing schemes with general access …
Webb15 nov. 1998 · Secret sharing schemes protect secrets by distributing them over different locations (share holders). In particular, in k out of n threshold schemes, security is assured if throughout the entire ... WebbProactive secret sharing scheme suitable for asymmetric secret sharing scheme Abstract: An asymmetric secret sharing scheme (A-SSS) can set the number of servers at less …
Proactive secret sharing is an underlying technique in Proactive Security Protocols. It is a method to update distributed keys (shares) in a secret sharing scheme periodically such that an attacker has less time to compromise shares and as long as the attacker visits less than a threshold or a quorum group, … Visa mer If the players (holders of the shared secret) store their shares on insecure computer servers, an attacker could crack in and steal/learn the shares. Since it is not often practical to change the secret, the un-compromised … Visa mer This follows somewhat the work in. In order to update the shares, the dealers (i.e., the persons who gives out the shares; and in a distributed system it is all participants one at a … Visa mer • Key (cryptography) • Key generation • Key distribution • Key management Visa mer WebbRabin, T.: A simplified approach to threshold and proactive RSA. In: Proceedings of the CRYPTO 1998, pp. 89–104 (1998) ... Rajabi B Eslami Z A verifiable threshold secret sharing scheme based on lattices Inf. Sci. 2024 501 655 661 3986385 10.1016/j.ins.2024.11.004 Google Scholar Digital Library; 47. Alkim, E., Barreto, P., Bindel, N., ...
Webb4 jan. 1997 · Proactive secret sharing (PSS) is proposed as an extension of threshold secret sharing schemes to protect the secrecy of the shared secret for an extended period of time [80, 81]....
Webb1 dec. 2024 · A Blockchain-Based Framework for Data Sharing With Fine-Grained Access Control in Decentralized Storage Systems. Article. Jun 2024. Shangping Wang. Yinglong Zhang. Yaling Zhang. View. Show abstract. fibre cement corrugated sheetingWebbA verifiable proactive secret sharing (VPSS) scheme is a verifiable secret sharing scheme with the property that the shareholders can renew their shares without reconstructing … fibre cement cladding repairWebb28 jan. 2024 · The first five indices in Table 3 are the characteristics of these schemes: (1) If the shares are meaningful images (2) If it is a verifiable scheme (3) If it has the features of proactive and dynamic (4) The underlying techniques for SIS (5) The underlying techniques for steganography. (6) The size of the shadows (7) The average number of … gregory howard congress