loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Takato Imai and Keiichi Iwamura

Affiliation: Faculty of Engineering, Tokyo University of Science, 6-3-1 Niijuku, Katsushika-ku, Tokyo, 125-8585 and Japan

Keyword(s): Secret Sharing Scheme, Asymmetric, Verification, Cloud.

Related Ontology Subjects/Areas/Topics: Cloud Technology ; e-Business ; Enterprise Information Systems ; Technology Platforms

Abstract: Conventional secret sharing schemes, such as Shamir's secret sharing scheme, cannot prevent the leak of shares when they are deposited on servers. In contrast, in an asymmetric secret sharing scheme, the owner of the secret has a stronger authority than the server, and the number of servers storing the share can be set to less than k. Therefore, even if all the shares stored in the server leak, the secret is not leaked. This can prevent the leakage of secrets from attacks on servers. In the conventional secret sharing scheme, a correct secret cannot be reconstructed if the attacker outputs a false share at the time of reconstruction by hijacking the server. This problem cannot be addressed even if asymmetric secret sharing is used. Therefore, we extend the asymmetric secret sharing scheme in a manner enabling the owner to detect a secret when an attacker outputs a false share. In the proposed scheme, a server is not required to store information other than the share if n > k. In othe r words, no burden is imposed on the server for verification. In addition, the hijacked servers can be identified under certain conditions, realizing an efficient verification method for secrets that is suitable for the asymmetric secret sharing scheme. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 44.200.210.43

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Imai, T. and Iwamura, K. (2019). Secret Verification Method Suitable for the Asymmetric Secret Sharing Scheme. In Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - ICE-B; ISBN 978-989-758-378-0; ISSN 2184-3236, SciTePress, pages 172-179. DOI: 10.5220/0007958201720179

@conference{ice-b19,
author={Takato Imai. and Keiichi Iwamura.},
title={Secret Verification Method Suitable for the Asymmetric Secret Sharing Scheme},
booktitle={Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - ICE-B},
year={2019},
pages={172-179},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0007958201720179},
isbn={978-989-758-378-0},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - ICE-B
TI - Secret Verification Method Suitable for the Asymmetric Secret Sharing Scheme
SN - 978-989-758-378-0
IS - 2184-3236
AU - Imai, T.
AU - Iwamura, K.
PY - 2019
SP - 172
EP - 179
DO - 10.5220/0007958201720179
PB - SciTePress