2017
DOI: 10.1155/2017/5437403
|View full text |Cite
|
Sign up to set email alerts
|

How to Share Secret Efficiently over Networks

Abstract: In a secret-sharing scheme, the secret is shared among a set of shareholders, and it can be reconstructed if a quorum of these shareholders work together by releasing their secret shares. However, in many applications, it is undesirable for nonshareholders to learn the secret. In these cases, pairwise secure channels are needed among shareholders to exchange the shares. In other words, a shared key needs to be established between every pair of shareholders. But employing an additional key establishment protoco… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

3
4

Authors

Journals

citations
Cited by 17 publications
(28 citation statements)
references
References 33 publications
0
28
0
Order By: Relevance
“…On the other hand, if > ℎ /( + ℎ), it can solve the trivariate polynomial used to generate the tokens of the sensors. Furthermore, from [30], since ( + ℎ) > ℎ, we have > . In other words, this attack needs to capture far more sensors than the previous attack to compromise the bivariate polynomial used to generate tokens for each class.…”
Section: Theorem 1 If the Attacker Captures K Ch Tokens The Attackementioning
confidence: 96%
See 2 more Smart Citations
“…On the other hand, if > ℎ /( + ℎ), it can solve the trivariate polynomial used to generate the tokens of the sensors. Furthermore, from [30], since ( + ℎ) > ℎ, we have > . In other words, this attack needs to capture far more sensors than the previous attack to compromise the bivariate polynomial used to generate tokens for each class.…”
Section: Theorem 1 If the Attacker Captures K Ch Tokens The Attackementioning
confidence: 96%
“…Each unique bivariate polynomial is kept by each CH. Note that the properties of this type of asymmetric bivariate polynomial can be found in [30]. Moreover, tokens of sensor nodes in the same cluster are generated by a bivariate polynomial.…”
Section: Token Generationmentioning
confidence: 99%
See 1 more Smart Citation
“…But this approach will significantly increase the complexity of secret sharing process. Harn et al have proposed secret sharing schemes based on bivariate polynomials [8,9]. One unique property of this approach is that shares generated by a dealer can serve for two purposes, that are, (a) to reconstruct the secret; and (b) to establish secret communication keys for shareholders.…”
Section: Introductionmentioning
confidence: 99%
“…Secret sharing (SS) schemes have been widely used in secure computer communications systems [1][2][3][4][5][6][7][8]. Blakley [9] and Shamir [10] independently introduced the concept of the secret sharing in 1979.…”
Section: Introductionmentioning
confidence: 99%