Secret Sharing Member Expansion Protocol Based on ECC

作者: Feng Wang , Yujie Wu , Daofeng Li

DOI: 10.2174/1874110X01408010248

关键词:

摘要: The protocols for member expansion in secret sharing schemes are very useful key management dynamic topology networks. In order to reduce the computation complexity of existed schemes, a new protocol is proposed based on problem elliptic curve discrete logarithm. This paper exam- ines fifteen most recent patens that were awarded area sharing. Unlike traditional detailed patent reviews focused applying simple method, has following merits: 1) there no trust center ; 2) only requesting broadcast 21 t + times generate sub-secret participant and can verify truth sub-secret; 3) old participants by non- interactive zero-knowledge proof protocol; 4) generation stage, not sub-secrets but also secure. Compared protocols, lower computational less communications. Therefore, higher performance suit- able resource-constrained terminals

参考文章(17)
Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah, Reliable and fully distributed trust model for mobile ad hoc networks Computers & Security. ,vol. 28, pp. 199- 214 ,(2009) , 10.1016/J.COSE.2008.11.009
Cheng Guo, Zhi-hui Wang, Chin-Chen Chang, Chuan Qin, None, A Secret Image Sharing Scheme with High Quality Shadows Based on Exploiting Modification Direction Journal of Multimedia. ,vol. 6, pp. 341- 348 ,(2011) , 10.4304/JMM.6.4.341-348
Yongquan Cai, Zhanhai Luo, Yi Yang, Rational Multi-Secret Sharing Scheme Based On Bit Commitment Protocol Journal of Networks. ,vol. 7, pp. 738- 745 ,(2012) , 10.4304/JNW.7.4.738-745
Haibo Zhang, Xiaofei Wang, Youpeng Huang, A Novel Ideal Contrast Visual Secret Sharing Scheme with Reversing Journal of Multimedia. ,vol. 4, pp. 104- 111 ,(2009) , 10.4304/JMM.4.3.104-111
Adi Shamir, How to share a secret Communications of the ACM. ,vol. 22, pp. 612- 613 ,(1979) , 10.1145/359168.359176