Verifiable secret sharing for monotone access structures
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
A perfect threshold secret sharing scheme to identify cheaters
Designs, Codes and Cryptography
Communications of the ACM
Secret Sharing in Multilevel and Compartmented Groups
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
How to (Really) Share a Secret
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
On Unconditionally Secure Robust Distributed Key Distribution Centers
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Verifiable Secret Redistribution for Archive Systems
SISW '02 Proceedings of the First International IEEE Security in Storage Workshop
Verifiable secret sharing and achieving simultaneity in the presence of faults
SFCS '85 Proceedings of the 26th Annual Symposium on Foundations of Computer Science
A practical scheme for non-interactive verifiable secret sharing
SFCS '87 Proceedings of the 28th Annual Symposium on Foundations of Computer Science
How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Two protocols for member revocation in secret sharing schemes
PAISI'11 Proceedings of the 6th Pacific Asia conference on Intelligence and security informatics
A simultaneous members enrollment and revocation protocol for secret sharing schemes
PAISI'12 Proceedings of the 2012 Pacific Asia conference on Intelligence and Security Informatics
Hi-index | 0.00 |
A protocol of the member-join in a secret sharing scheme is proposed. The proposed protocol can ensure that the original group members' keys remain invariable after the fresh member joins in the group. It makes the key management convenience. The original members can't gain the share key of the new member, and the keys of the original members don't be leaked out when distributing the share key for the new member. In the key's distributing process, the behavior of the cheaters can be detected, and the new member himself can verify the validity of his share key.