loading
Papers

Research.Publish.Connect.

Paper

Authors: Takato Imai and Keiichi Iwamura

Affiliation: Faculty of Engineering, Tokyo University of Science, 6-3-1 Niijuku, Katsushika-ku, Tokyo, 125-8585 and Japan

ISBN: 978-989-758-378-0

Keyword(s): Secret Sharing Scheme, Asymmetric, Verification, Cloud.

Related Ontology Subjects/Areas/Topics: Cloud Technology ; e-Business ; Enterprise Information Systems ; Technology Platforms

Abstract: Conventional secret sharing schemes, such as Shamir's secret sharing scheme, cannot prevent the leak of shares when they are deposited on servers. In contrast, in an asymmetric secret sharing scheme, the owner of the secret has a stronger authority than the server, and the number of servers storing the share can be set to less than k. Therefore, even if all the shares stored in the server leak, the secret is not leaked. This can prevent the leakage of secrets from attacks on servers. In the conventional secret sharing scheme, a correct secret cannot be reconstructed if the attacker outputs a false share at the time of reconstruction by hijacking the server. This problem cannot be addressed even if asymmetric secret sharing is used. Therefore, we extend the asymmetric secret sharing scheme in a manner enabling the owner to detect a secret when an attacker outputs a false share. In the proposed scheme, a server is not required to store information other than the share if n > k. In other words, no burden is imposed on the server for verification. In addition, the hijacked servers can be identified under certain conditions, realizing an efficient verification method for secrets that is suitable for the asymmetric secret sharing scheme. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 35.168.111.191

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Imai, T. and Iwamura, K. (2019). Secret Verification Method Suitable for the Asymmetric Secret Sharing Scheme.In Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 1: ICE-B, ISBN 978-989-758-378-0, pages 172-179. DOI: 10.5220/0007958201720179

@conference{ice-b19,
author={Takato Imai. and Keiichi Iwamura.},
title={Secret Verification Method Suitable for the Asymmetric Secret Sharing Scheme},
booktitle={Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 1: ICE-B,},
year={2019},
pages={172-179},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0007958201720179},
isbn={978-989-758-378-0},
}

TY - CONF

JO - Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 1: ICE-B,
TI - Secret Verification Method Suitable for the Asymmetric Secret Sharing Scheme
SN - 978-989-758-378-0
AU - Imai, T.
AU - Iwamura, K.
PY - 2019
SP - 172
EP - 179
DO - 10.5220/0007958201720179

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.