Secured hierarchical secret sharing using ECC based signcryption

  • Authors:
  • Atanu Basu;Indranil Sengupta;Jamuna Kanta Sing

  • Affiliations:
  • Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, 721302, India;Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, 721302, India;Department of Computer Science and Engineering, Jadavpur University, Kolkata, 700032, India

  • Venue:
  • Security and Communication Networks
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Most of the existing hierarchical secret-sharing schemes are unconditionally (non-cryptographically) secured, and they cannot survive from various types of attacks especially when the participants use resource-constrained wireless mobile devices. In our proposed secured hierarchical secret-sharing scheme, the participants are partitioned into different levels according to their ranks in any organization. In this hierarchy-based secret-sharing scheme, the trusted dealer distributes the delegated secret keys as shares to the participants through our proposed signcryption scheme that reduces computational cost and communication overhead. Again, the participants submit the signcrypted shares to the trusted dealer for reconstruction of the secret key. The proposed scheme distinguishes each level of hierarchy qualitatively, and any type of active or passive adversary or colluding participants cannot reconstruct the secret key. The novelty of our scheme is that it is conditionally (cryptographically) as well as unconditionally secured, and the participants may use resource-constrained wireless mobile devices. The access structure chosen for our scheme increases the resilience of our scheme. Our proposed scheme is perfect and ideal. Copyright © 2011 John Wiley & Sons, Ltd.