Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation. (10th October 2019)
- Record Type:
- Journal Article
- Title:
- Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation. (10th October 2019)
- Main Title:
- Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation
- Authors:
- Zhang, En
Zhu, Jun-Zhe
Li, Gong-Li
Chang, Jian
Li, Yu - Other Names:
- Hussain Mehdi Guest Editor.
- Abstract:
- Abstract : Secret sharing is a basic tool in modern communication, which protects privacy and provides information security. Among the secret sharing schemes, fairness is a vital and desirable property. To achieve fairness, the existing secret sharing schemes either require a trusted third party or the execution of a multiround protocol, which are impractical. Moreover, the classic scheme requires expensive computing in the secret verification phase. In this work, we provide an outsourcing hierarchical threshold secret sharing (HTSS) protocol based on reputation. In the scheme, participants from different levels can fairly reconstruct the secret, and the protocol only needs to run for one round. A cloud service provider (CSP) uses powerful computing resources to help participants complete homomorphic encryption and complex verification operations, and the CSP cannot be aware of any valuable information. The participants can obtain the secret with a small number of operations. To avoid collusion, we suppose that participants have their own reputation value, and they are punished or rewarded according to their behavior. The reputation value of a participant who deviates from the protocol will decrease; therefore, the participant will choose a cooperative strategy to obtain better payoffs. Lastly, our scheme is proved to be secure, and experiments indicate that our scheme is feasible and efficient.
- Is Part Of:
- Security and communication networks. Volume 2019(2019)
- Journal:
- Security and communication networks
- Issue:
- Volume 2019(2019)
- Issue Display:
- Volume 2019, Issue 2019 (2019)
- Year:
- 2019
- Volume:
- 2019
- Issue:
- 2019
- Issue Sort Value:
- 2019-2019-2019-0000
- Page Start:
- Page End:
- Publication Date:
- 2019-10-10
- Subjects:
- Computer networks -- Security measures -- Periodicals
Computer security -- Periodicals
Cryptography -- Periodicals
005.805 - Journal URLs:
- http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1939-0122 ↗
https://www.hindawi.com/journals/scn/ ↗
http://onlinelibrary.wiley.com/ ↗ - DOI:
- 10.1155/2019/6989383 ↗
- Languages:
- English
- ISSNs:
- 1939-0114
- Deposit Type:
- Legaldeposit
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD Digital store
- Ingest File:
- 11989.xml