A New Threshold Scheme Based on Hierarchical and Sequential Share

Article Preview

Abstract:

As an important method for secret shared and key recovery since has been proposed, threshold scheme has been extensively studied and applied. In this paper, an improved threshold scheme based on the order is proposed in order to meet actual application's demands and enhances the security of the traditional threshold scheme. This new scheme can approximate immensely expand the number of permutation so that even the attacker gets all secret shares but difficult to recover the original secret. So the new scheme proposed in this paper can increase the security of the threshold scheme greatly and expands the application occasions of the threshold scheme.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 694-697)

Pages:

2813-2817

Citation:

Online since:

May 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Wang Wei, Zhou Shunxian. Special Threshold Secret Sharing Scheme Among Weighted Participants [J]. Computer Engineering, 2011,37 (14): 109-111.

Google Scholar

[2] Huang Meijuan.Threshold proxy signature scheme based on RSA secret system [J]. Computer Engineering, 2012,38 (8): 105-106.

Google Scholar

[3] Gu Lize, Wang Feng, Zheng Shihui. A novel forward secure threshold digital signature scheme [J]. Journal of Shenyang University of Technology, 2012,34 (2): 198-202.

Google Scholar

[4] Chu Jingjing, Yu Xiuyuan. Cryptanalysis and improvement of a threshold signature scheme [J]. Journal of Hangzhou Normal University(Natural Science Edition), 2012,11 (2): 157-161.

Google Scholar

[5] Shen yuan, Chu Longxian. A Bilinear Pairs-based Threshold Key Management Scheme[J]. Computer & Digital Engineering, 2012,40 (2): 90-91.

Google Scholar

[6] Zou Hui, Wang Jiandong, Song Chao. Weighted Threshold Multi-secret Sharing Scheme [J]. Computer Engineering, 2012,38 (3): 148-149.

Google Scholar

[7] Cui Wei, Yan Xuefeng, Shen Ming. Cryptanalysis and Improvement of ID-based Threshold Proxy Signature Scheme [J]. Computer & Digital Engineering, 2012,40 (2): 72-74.

Google Scholar

[8] Wang Feng, Zhou Yousheng, Gu Lize. A Multi-Policies Threshold Signature Scheme with Group Verifiability [J]. Journal of Computer Research and Development, 2012,49 (3): 499-505.

Google Scholar

[9] Sattar J Aboud, Mohammad AL-Fayoumi. Efficient Threshold Signature Scheme[J]. International Journal of Advanced Computer Sciences and Applications, 2012,3 (1): 112-115.

Google Scholar

[10] Shi Runhua, Huang Liusheng, Yang Wei, Zhong Hong. Novel and effective secret sharing scheme [J]. Journal on Communications, 2012,33 (1): 10-16.

Google Scholar

[11] Wang Daxing, Zhu Heming, Teng Jikai. Efficient Forward Security Threshold Signature Scheme [J]. Computer Engineering, 2012,38 (1): 111-113.

Google Scholar

[12] Wang Weicong, Li Zhihui. Periodically renewed ( t,n )threshold multi-secret sharing scheme [J]. Computer Engineering and Applications, 2011,47 (36): 96-98.

Google Scholar

[13] Yin Fengmei, Pu Guangning. New Member Joining in a Secret Sharing Scheme without a Trusted Party [J]. Journal of Chongqing University of Science and Technology(Natural Sciences Edition), 2011,13 (6): 173-175.

Google Scholar