Threshold changeable secret sharing schemes revisited

This paper studies the methods for changing thresholds in the absence of secure channels after the setup of threshold secret sharing schemes. First, we construct a perfect (t,n)(t,n) threshold scheme that is threshold changeable to t′>tt′>t, which is optimal with respect to the share size. Thi...

Full description

Saved in:
Bibliographic Details
Main Authors: Zhang, Zhifang, Chee, Yeow Meng, Ling, San, Liu, Mulan, Wang, Huaxiong
Other Authors: School of Physical and Mathematical Sciences
Format: Article
Language:English
Published: 2013
Online Access:https://hdl.handle.net/10356/96595
http://hdl.handle.net/10220/10306
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-96595
record_format dspace
spelling sg-ntu-dr.10356-965952020-03-07T12:34:42Z Threshold changeable secret sharing schemes revisited Zhang, Zhifang Chee, Yeow Meng Ling, San Liu, Mulan Wang, Huaxiong School of Physical and Mathematical Sciences This paper studies the methods for changing thresholds in the absence of secure channels after the setup of threshold secret sharing schemes. First, we construct a perfect (t,n)(t,n) threshold scheme that is threshold changeable to t′>tt′>t, which is optimal with respect to the share size. This improves the scheme of Wang and Wong by relaxing the requirement from q≥n+vq≥n+v to q>nq>n with the secret-domain Fqv. But these threshold changeable schemes along with most previously known schemes turn out to be insecure under the collusion attack of players holding initial shares. By adding a broadcast enforcement term we enhance the model with collusion security and NN options of threshold change. Then we construct a computationally secure scheme under the enhanced model, which involves much shorter shares and broadcast messages than the perfect schemes. Finally, we discuss how to realize the enrollment and disenrollment of players, and particularly, how to deal with L-fold changes of access polices. 2013-06-13T03:16:35Z 2019-12-06T19:32:52Z 2013-06-13T03:16:35Z 2019-12-06T19:32:52Z 2012 2012 Journal Article Zhang, Z., Chee, Y. M., Ling, S., Liu, M., & Wang, H. (2012). Threshold changeable secret sharing schemes revisited. Theoretical Computer Science, 418, 106-115. 0304-3975 https://hdl.handle.net/10356/96595 http://hdl.handle.net/10220/10306 10.1016/j.tcs.2011.09.027 en Theoretical computer science © 2012 Elsevier B. V.
institution Nanyang Technological University
building NTU Library
country Singapore
collection DR-NTU
language English
description This paper studies the methods for changing thresholds in the absence of secure channels after the setup of threshold secret sharing schemes. First, we construct a perfect (t,n)(t,n) threshold scheme that is threshold changeable to t′>tt′>t, which is optimal with respect to the share size. This improves the scheme of Wang and Wong by relaxing the requirement from q≥n+vq≥n+v to q>nq>n with the secret-domain Fqv. But these threshold changeable schemes along with most previously known schemes turn out to be insecure under the collusion attack of players holding initial shares. By adding a broadcast enforcement term we enhance the model with collusion security and NN options of threshold change. Then we construct a computationally secure scheme under the enhanced model, which involves much shorter shares and broadcast messages than the perfect schemes. Finally, we discuss how to realize the enrollment and disenrollment of players, and particularly, how to deal with L-fold changes of access polices.
author2 School of Physical and Mathematical Sciences
author_facet School of Physical and Mathematical Sciences
Zhang, Zhifang
Chee, Yeow Meng
Ling, San
Liu, Mulan
Wang, Huaxiong
format Article
author Zhang, Zhifang
Chee, Yeow Meng
Ling, San
Liu, Mulan
Wang, Huaxiong
spellingShingle Zhang, Zhifang
Chee, Yeow Meng
Ling, San
Liu, Mulan
Wang, Huaxiong
Threshold changeable secret sharing schemes revisited
author_sort Zhang, Zhifang
title Threshold changeable secret sharing schemes revisited
title_short Threshold changeable secret sharing schemes revisited
title_full Threshold changeable secret sharing schemes revisited
title_fullStr Threshold changeable secret sharing schemes revisited
title_full_unstemmed Threshold changeable secret sharing schemes revisited
title_sort threshold changeable secret sharing schemes revisited
publishDate 2013
url https://hdl.handle.net/10356/96595
http://hdl.handle.net/10220/10306
_version_ 1681045289676308480