Please wait, while we are loading the content...
Please wait, while we are loading the content...
| Content Provider | IEEE Xplore Digital Library |
|---|---|
| Author | Ye Zhenjun |
| Copyright Year | 2006 |
| Description | Author affiliation: North China Electron. Power Univ., Beijing (Ye Zhenjun) |
| Abstract | A multi-degree secrecy system is constructed based on threshold secret sharing. In this system, a tree-like relation among the participators was set up, and by which a tree structure came into being for the secret shares. This scheme can be demarcated into three phases: initial phase, distribution phase and reconstruction phase. In the initial phase, the dealer (or the most privileged person) "divides" his secret key into n pieces by the number of his juniors (some of them can be gathered to renew the secret key ). And for each share, take it as a new secret key and "divide" it into some pieces so that a new share set was got. Repeat this process until a tree of secret key come into being, which is isomorphic to the tree of participators. In the distribution phase, the dealer distributes the keys of the key tree to the participators on the corresponding position of the participator tree. And in the reconstruction phase, the shareholders of each group can renew the shared secret key by the shares they hold, which ensure that this group can renew the prior key if it is lost. In this system, all the secrets are connected with a tree structure, and all of them are dependent on the secret shares lying on the leaves of the tree; by which much cost of computation and communication is saved. And because of the peculiarity of (t, n) secret sharing schemes that any subset with less t-1 shareholders are not capable of renewing the secret shared by them, this system is relatively secure to some extent, and the security of this system depends on the security of Shamir's (t, n) threshold secret sharing scheme. However, the (t, n) threshold scheme in this system is selected just because it is the simplest one of the current secret sharing schemes. But the steps using Shamir's (t, n) threshold secret sharing scheme are dependent and these steps can be replaced with other secret sharing schemes, such as verifiable secret sharing scheme, proactive secret sharing scheme, and so on, by which the secrecy systems with more peculiarities and applications can be constructed, and the most important of which is that it can provide more security. This system can be applied into the fields of relatively high require of security, such as electric, financial and military fields, to get a multi-degree management of secrets. Take the electric field for example, this system allows the leader to assign different power to different junior by the way of distributing secret shares, by which the behavior over his power is prohibited so that some unnecessary loss is avoided. Furthermore, the authorized group of shareholders can reconstruct the secret if it is lost or the shareholder with it "mutinies", by which the process of reconstructing system is avoided once some shareholder loses his secret (key) or "mutinies". |
| Starting Page | 1 |
| Ending Page | 4 |
| File Size | 4150065 |
| Page Count | 4 |
| File Format | |
| ISBN | 1424401100 |
| DOI | 10.1109/ICPST.2006.321795 |
| Language | English |
| Publisher | Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher Date | 2006-10-22 |
| Publisher Place | China |
| Access Restriction | Subscribed |
| Rights Holder | Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Subject Keyword | Cryptography Tree data structures Safety Communication system security Power system security Cryptographic protocols Acceleration Information security Power systems Computational efficiency tree structure cryptography crunode data encryption information safety Lagrange interpolation formula multi-degree multi-phase protocol secret sharing threshold |
| Content Type | Text |
| Resource Type | Article |
National Digital Library of India (NDLI) is a virtual repository of learning resources which is not just a repository with search/browse facilities but provides a host of services for the learner community. It is sponsored and mentored by Ministry of Education, Government of India, through its National Mission on Education through Information and Communication Technology (NMEICT). Filtered and federated searching is employed to facilitate focused searching so that learners can find the right resource with least effort and in minimum time. NDLI provides user group-specific services such as Examination Preparatory for School and College students and job aspirants. Services for Researchers and general learners are also provided. NDLI is designed to hold content of any language and provides interface support for 10 most widely used Indian languages. It is built to provide support for all academic levels including researchers and life-long learners, all disciplines, all popular forms of access devices and differently-abled learners. It is designed to enable people to learn and prepare from best practices from all over the world and to facilitate researchers to perform inter-linked exploration from multiple sources. It is developed, operated and maintained from Indian Institute of Technology Kharagpur.
Learn more about this project from here.
NDLI is a conglomeration of freely available or institutionally contributed or donated or publisher managed contents. Almost all these contents are hosted and accessed from respective sources. The responsibility for authenticity, relevance, completeness, accuracy, reliability and suitability of these contents rests with the respective organization and NDLI has no responsibility or liability for these. Every effort is made to keep the NDLI portal up and running smoothly unless there are some unavoidable technical issues.
Ministry of Education, through its National Mission on Education through Information and Communication Technology (NMEICT), has sponsored and funded the National Digital Library of India (NDLI) project.
| Sl. | Authority | Responsibilities | Communication Details |
|---|---|---|---|
| 1 | Ministry of Education (GoI), Department of Higher Education |
Sanctioning Authority | https://www.education.gov.in/ict-initiatives |
| 2 | Indian Institute of Technology Kharagpur | Host Institute of the Project: The host institute of the project is responsible for providing infrastructure support and hosting the project | https://www.iitkgp.ac.in |
| 3 | National Digital Library of India Office, Indian Institute of Technology Kharagpur | The administrative and infrastructural headquarters of the project | Dr. B. Sutradhar bsutra@ndl.gov.in |
| 4 | Project PI / Joint PI | Principal Investigator and Joint Principal Investigators of the project |
Dr. B. Sutradhar bsutra@ndl.gov.in Prof. Saswat Chakrabarti will be added soon |
| 5 | Website/Portal (Helpdesk) | Queries regarding NDLI and its services | support@ndl.gov.in |
| 6 | Contents and Copyright Issues | Queries related to content curation and copyright issues | content@ndl.gov.in |
| 7 | National Digital Library of India Club (NDLI Club) | Queries related to NDLI Club formation, support, user awareness program, seminar/symposium, collaboration, social media, promotion, and outreach | clubsupport@ndl.gov.in |
| 8 | Digital Preservation Centre (DPC) | Assistance with digitizing and archiving copyright-free printed books | dpc@ndl.gov.in |
| 9 | IDR Setup or Support | Queries related to establishment and support of Institutional Digital Repository (IDR) and IDR workshops | idr@ndl.gov.in |
|
Loading...
|