Two protocols for member revocation in secret sharing schemes

  • Authors:
  • Jia Yu;Fanyu Kong;Xiangguo Cheng;Rong Hao

  • Affiliations:
  • College of Information Engineering, Qingdao University, Qingdao, China;Institute of Network Security, Shandong University, Jinan, China;College of Information Engineering, Qingdao University, Qingdao, China;College of Information Engineering, Qingdao University, Qingdao, China

  • Venue:
  • PAISI'11 Proceedings of the 6th Pacific Asia conference on Intelligence and security informatics
  • Year:
  • 2011

Quantified Score

Hi-index 0.01

Visualization

Abstract

Secret sharing scheme plays a very important role in modern electronic applications. In actual circumstance, the members in secret sharing schemes may need to be changed. For example, some new members may join the system and some old members may leave the system. Therefore, how to construct the protocols satisfying these requirements is an important task. In this work, we discuss two protocols about revoking the old members in secret sharing schemes. In the first protocol, other members can make the share of one member leaving secret sharing scheme invalid. At the same time, the corresponding threshold value is unchanged. In the second protocol, publicly verifiable property is added to the first protocol. Thus the validity of the protocol can be verified by anyone besides the members executing the protocol. The both protocols are especially useful for the alterable circumstances such as ad hoc networks.