Communications of the ACM
A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
A PVSS as Hard as Discrete Log and Shareholder Separability
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Verifiable Secret Redistribution for Archive Systems
SISW '02 Proceedings of the First International IEEE Security in Storage Workshop
An Extended Verifiable Secret Redistribution Protocol for Archival Systems
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Publicly Verifiable Secret Sharing with Enrollment Ability
SNPD '07 Proceedings of the Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing - Volume 03
A practical scheme for non-interactive verifiable secret sharing
SFCS '87 Proceedings of the 28th Annual Symposium on Foundations of Computer Science
How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Publicly verifiable secret sharing
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
A protocol of member-join in a secret sharing scheme
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
A simultaneous members enrollment and revocation protocol for secret sharing schemes
PAISI'12 Proceedings of the 2012 Pacific Asia conference on Intelligence and Security Informatics
Hi-index | 0.01 |
Secret sharing scheme plays a very important role in modern electronic applications. In actual circumstance, the members in secret sharing schemes may need to be changed. For example, some new members may join the system and some old members may leave the system. Therefore, how to construct the protocols satisfying these requirements is an important task. In this work, we discuss two protocols about revoking the old members in secret sharing schemes. In the first protocol, other members can make the share of one member leaving secret sharing scheme invalid. At the same time, the corresponding threshold value is unchanged. In the second protocol, publicly verifiable property is added to the first protocol. Thus the validity of the protocol can be verified by anyone besides the members executing the protocol. The both protocols are especially useful for the alterable circumstances such as ad hoc networks.