Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Unconditionally secure social secret sharing scheme

Unconditionally secure social secret sharing scheme

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The authors introduce the notion of a ‘social secret sharing scheme’, in which shares are allocated based on a player's reputation and the way he/she interacts with other participants. During the social tuning phase, weights of players are adjusted such that participants who cooperate will end up with more shares than those who defect. Alternatively, newcomers are able to be enrolled in the scheme while corrupted players are disenrolled immediately. In other words, this scheme proactively renews shares at each cycle without changing the secret, and allows trusted participants to gain more authority. The motivation is that, in real-world applications, components of a secure scheme may have different levels of importance (i.e. the number of shares a player has) as well as reputation (i.e. cooperation with other players for the share renewal or secret recovery). Therefore a good construction should balance these two factors, respectively. In the proposed schemes, both the passive and active mobile adversaries are considered in an unconditionally secure setting.

References

    1. 1)
      • B. Yu , M.P. Singh , M. Klusch , L. (Eds.) Kerschberg . (2000) A social mechanism of reputation management in electronic communities’in, CIA.
    2. 2)
      • Goldwasser, S.: `Multi party computations: past and present', Proc. 16th Ann. ACM Symp. on Principles of Distributed Computing, PODC'97, 1997, p. 1–6.
    3. 3)
      • Chor, B., Goldwasser, S., Micali, S., Awerbuch, B.: `Verifiable secret sharing and achieving simultaneity in the presence of faults', FOCS, 1985, p. 383–395.
    4. 4)
      • A. Shamir . How to share a secret. Commun. ACM , 11 , 612 - 613
    5. 5)
      • C. Blundo , A. Cresti , A.D. Santis , U. Vaccaro . Fully dynamic secret sharing schemes. Theoret. Comput. Sci. , 2 , 407 - 440
    6. 6)
      • D'Arco, P., Stinson, D.R.: `On unconditionally secure robust distributed key distribution centers', Proc. Advances in Cryptology, ASIACRYPT'02, 2002, p. 346–363, (LNCS).
    7. 7)
      • D.R. Stinson , R. Wei , H.M. Heys , C.M. (Eds.) Adams . (1999) Unconditionally secure proactive secret sharing scheme with combinatorial structures’, Selected areas in cryptography.
    8. 8)
      • Du, W., Atallah, M.J.: `Secure multi-party computation problems and their applications: a review and open problems', Proc. Workshop on New Security Paradigms, NSPW'01, 2001, p. 13–22.
    9. 9)
      • Blakley, G.R.: `Safeguarding cryptographic keys', National Computer Conference, 1979, New York, Montvale, NJ, USA, p. 313–317, vol. 48 of AFIPS Conf. Proc..
    10. 10)
      • Mui, L., Mohtashemi, M., Halberstadt, A.: `A computational model of trust and reputation for e-businesses', HICSS, 2002, p. 2431–2439.
    11. 11)
      • Rabin, T., Ben-Or, M.: `Verifiable secret sharing and multiparty protocols with honest majority', STOC, 1989, p. 73–85.
    12. 12)
      • Ostrovsky, R., Yung, M.: `How to withstand mobile virus attacks (extended abstract)', Proc. 10th Ann. ACM Symp. on Principles of Distributed Computing, PODC'91, 1991, p. 51–59.
    13. 13)
      • D.R. Stinson . (1995) Cryptography: theory and practice.
    14. 14)
      • C. Tartary , H. Wang , H. Lipmaa , M. Yung , D. (Eds.) Lin . (2006) Dynamic threshold and cheater resistance for shamir secret sharing scheme’, Inscrypt.
    15. 15)
      • D. Boneh , M. Franklin . Efficient generation of shared rsa keys. J. ACM , 4 , 702 - 722
    16. 16)
      • Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: `Proactive secret sharing or: How to cope with perpetual leakage', CRYPTO, 1995, p. 339–352, (LNCS, 963).
    17. 17)
      • Nojoumian, M., Lethbridge, T.: `A new approach for the trust calculation in social networks', E-business and Telecommunication Networks: Third Int. Conf. on E-Business, Selected Papers, 2008, 9, p. 64–77.
    18. 18)
      • Benaloh, J.C., Leichter, J.: `Generalized secret sharing and monotone functions', CRYPTO, 1988, p. 27–35, (LNCS, 403).
    19. 19)
      • R.S. Rees , D.R. Stinson , R. Wei , G.H.J. van Rees . An application of covering designs: determining the maximum consistent set of shares in a threshold scheme. Ars. Comb. , 225 - 237
    20. 20)
      • Y. Zhang , Z. Liu . Dynamic and verifiable secret sharing among weighted participants. J. Syst. Sci. Complexity , 4 , 481 - 485
    21. 21)
      • Harkavy, M., Tygar, J.D., Kikuchi, H.: `Electronic auctions with private bids', Proc. Third Conf. on USENIX Workshop on Electronic Commerce, WOEC'98, 1998, p. 61–74.
    22. 22)
      • Saxena, N., Tsudik, G., Yi, J.H.: `Efficient node admission for short-lived mobile ad hoc networks', Proc. 13th IEEE Int. Conf. on Network Protocols, 2005, p. 269–278.
    23. 23)
      • Ben-Or, M., Goldwasser, S., Wigderson, A.: `Completeness theorems for non-cryptographic fault-tolerant distributed computation', STOC, 1988, p. 1–10.
    24. 24)
      • A. Jøsang , R. Ismail , C. Boyd . A survey of trust and reputation systems for online service provision. Decis. Support Syst. , 2 , 618 - 644
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2009.0098
Loading

Related content

content/journals/10.1049/iet-ifs.2009.0098
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address