Communications of the ACM
A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
A PVSS as Hard as Discrete Log and Shareholder Separability
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Verifiable Secret Redistribution for Archive Systems
SISW '02 Proceedings of the First International IEEE Security in Storage Workshop
An Extended Verifiable Secret Redistribution Protocol for Archival Systems
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Publicly Verifiable Secret Sharing with Enrollment Ability
SNPD '07 Proceedings of the Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing - Volume 03
A practical scheme for non-interactive verifiable secret sharing
SFCS '87 Proceedings of the 28th Annual Symposium on Foundations of Computer Science
How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Publicly verifiable secret sharing
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Two protocols for member revocation in secret sharing schemes
PAISI'11 Proceedings of the 6th Pacific Asia conference on Intelligence and security informatics
A protocol of member-join in a secret sharing scheme
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
Hi-index | 0.00 |
Secret sharing schemes have very wide applications in modern electronic society. In a secret sharing scheme, the shared secret is divided into multiple shares and only more than certain number of shares can reconstruct the secret. However, sometimes members may leave or join a secret sharing system in some variable circumstances. Therefore, constructing dynamic secret sharing is an important task. In this paper, we discuss a protocol about enrolling and revoking members simultaneously in a secret sharing scheme. Compared with previous protocols, our protocol can accomplish a new member's enrollment and an old member's revocation in fewer rounds. This protocol is especially useful for the circumstances where members join and leave secret sharing system frequently such as ad hoc networks.