題名: | Strategies of Proactive (k, n) Threshold Secret Sharing and Applications in a Secure Message Exchange System |
作者: | Wang, Shiuh-Jeng Tsai, Yuh-Ren Chen, Pin-You |
關鍵字: | Threshold secret sharing proactive secret sharing sharing polynomial decision-making |
摘要: | A secret sharing scheme protects the secret by distributing it to a group of participants (nodes), and it allows for some groups of participants to collaborate together to reconstruct this secret. With regard to the (k, n) threshold scheme, k out of n or more participants can reconstruct the secret. The proactive secret sharing scheme periodically updates the distributed secret (shadow). Based on such a proactive secret sharing scheme, we propose a completely mobile proactive secret sharing scheme, which not only allows for the changing of participant number n, but also arbitrarily changes the threshold k. Furthermore, we apply our technical idea to a specified project exploitation in the real commerce transaction systems to fulfill a trust-based delivery. |
日期: | 2008-11-11T06:33:12Z |
分類: | Journal of Computers第19卷 |
文件中的檔案:
檔案 | 描述 | 大小 | 格式 | |
---|---|---|---|---|
JOC_19_1_5.pdf | 243.24 kB | Adobe PDF | 檢視/開啟 |
在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。