English  |  正體中文  |  简体中文  |  Items with full text/Total items : 90429/105609 (86%)
Visitors : 10304087      Online Users : 361
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    ASIA unversity > 資訊學院 > 資訊工程學系 > 期刊論文 >  Item 310904400/100396


    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/100396


    Title: An Integratable Verifiable Secret Sharing Mechanism
    Authors: Liu, Yanjun;Liu, Yanjun;張真誠;CHang, Chin-Chen;*
    Contributors: 資訊工程學系
    Date: 2016-07
    Issue Date: 2016-08-08 14:55:53 (UTC+8)
    Abstract: Threshold secret sharing (SS), also denoted as (t, n) SS,
    has been used extensively in the area of information security,
    such as for group authentication, cloud storage
    schemes, secure parallel communication and wireless multipath
    routing protocols. However, a (t, n) SS cannot detect
    any deceptions among the dealer and shareholders.
    Verifiable secret sharing (VSS) overcomes the weakness of
    (t, n) SS in such a way that it is able to detect cheaters
    by verifying the validity of shares or the correctness of
    the recovered secret under the condition that both shares
    and the secret are not compromised. Recently, two noninteractive
    VSSs based on Asmuth-Bloom’s SS were proposed
    by Harn et al. and Liu et al., respectively. Both
    VSSs require shareholders to examine the range of values
    of some integers related to the secret before recovering
    the secret, which is a time-consuming operation. In this
    paper, we propose a novel integratable VSS mechanism
    that integrates the concepts of the generalized Chinese
    remainder theorem (GCRT), Shamir’s SS and AsmuthBloom’s
    SS. Our proposed VSS can verify that the secret
    reconstructed by any t or more shareholders is the same
    as the one that the dealer has generated. Analysis shows
    that our proposed V
    Relation: International Journal of Network Security
    Appears in Collections:[資訊工程學系] 期刊論文

    Files in This Item:

    File SizeFormat
    index.html0KbHTML124View/Open


    All items in ASIAIR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback