Securing Mobile Ad Hoc Networks with Certificateless Public Keys
IEEE Transactions on Dependable and Secure Computing
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
A Fully Distributed Proactively Secure Threshold-Multisignature Scheme
IEEE Transactions on Parallel and Distributed Systems
How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
MPSS: Mobile Proactive Secret Sharing
ACM Transactions on Information and System Security (TISSEC)
Two protocols for member revocation in secret sharing schemes
PAISI'11 Proceedings of the 6th Pacific Asia conference on Intelligence and security informatics
An infrastructure for long-term archiving of authenticated and sensitive electronic documents
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
A protocol of member-join in a secret sharing scheme
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
SP'11 Proceedings of the 19th international conference on Security Protocols
A simultaneous members enrollment and revocation protocol for secret sharing schemes
PAISI'12 Proceedings of the 2012 Pacific Asia conference on Intelligence and Security Informatics
Algorithms for a distributed IDS in MANETs
Journal of Computer and System Sciences
Hi-index | 0.00 |
We present a new verifiable secret redistribution protocolor threshold sharing schemes that forms a key componentof a proposed archival storage system. Our protocol supports redistribution from (m,n) to (m,n) threshold sharing schemes without requiring reconstruction of the original data. The design is motivated by archive systems orwhich the added security of threshold sharing of data mustbe accompanied by the flexibility of dynamic shareholderchanges. Our protocol enables the dynamic addition or removal of shareholders, and also guards against mobile adversaries. We observe that existing protocols either cannotbe extended readily to allow redistribution between differentaccess structures, or have vulnerabilities that allow faultyold shareholders to distribute invalid shares to new share-holders. Our primary contribution is that in our protocol,new shareholders can verify the validity of their shares afterredistribution between different access structures.