Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation
Secret sharing is a basic tool in modern communication, which protects privacy and provides information security. Among the secret sharing schemes, fairness is a vital and desirable property. To achieve fairness, the existing secret sharing schemes either require a trusted third party or the executi...
Gespeichert in:
Veröffentlicht in: | Security and communication networks 2019-10, Vol.2019, p.1-8 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 8 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | Security and communication networks |
container_volume | 2019 |
creator | Zhang, En Zhu, Jun-Zhe Li, Gong-Li Chang, Jian Li, Yu |
description | Secret sharing is a basic tool in modern communication, which protects privacy and provides information security. Among the secret sharing schemes, fairness is a vital and desirable property. To achieve fairness, the existing secret sharing schemes either require a trusted third party or the execution of a multiround protocol, which are impractical. Moreover, the classic scheme requires expensive computing in the secret verification phase. In this work, we provide an outsourcing hierarchical threshold secret sharing (HTSS) protocol based on reputation. In the scheme, participants from different levels can fairly reconstruct the secret, and the protocol only needs to run for one round. A cloud service provider (CSP) uses powerful computing resources to help participants complete homomorphic encryption and complex verification operations, and the CSP cannot be aware of any valuable information. The participants can obtain the secret with a small number of operations. To avoid collusion, we suppose that participants have their own reputation value, and they are punished or rewarded according to their behavior. The reputation value of a participant who deviates from the protocol will decrease; therefore, the participant will choose a cooperative strategy to obtain better payoffs. Lastly, our scheme is proved to be secure, and experiments indicate that our scheme is feasible and efficient. |
doi_str_mv | 10.1155/2019/6989383 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2455777503</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2455777503</sourcerecordid><originalsourceid>FETCH-LOGICAL-c337t-aeeb4d8b87d358004772854eed6a9c9886117b5306b00f743f9d404dcbee851c3</originalsourceid><addsrcrecordid>eNp90EFLwzAUB_AgCs7pzQ8Q8Kh1SZM0yVHHdMJg4OY5pMmrzdjambSI396ODY-e3jv8-D_eH6FbSh4pFWKSE6onhVaaKXaGRlQznRGa5-d_O-WX6CqlDSEF5ZKP0GLZd6ntowvNJ54HiDa6Oji7xes6QqrbrccrcBE6vKptPKiVq2EH-Nkm8Lht8Dvs-852oW2u0UVltwluTnOMPl5m6-k8Wyxf36ZPi8wxJrvMApTcq1JJz4QihEuZK8EBfGG100oVlMpSMFKUhFSSs0p7Trh3JYAS1LExujvm7mP71UPqzGZ4oRlOmpwLIaUUhA3q4ahcbFOKUJl9DDsbfwwl5tCXOfRlTn0N_P7I69B4-x3-17_lp2mX</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455777503</pqid></control><display><type>article</type><title>Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation</title><source>EZB-FREE-00999 freely available EZB journals</source><source>Wiley Online Library (Open Access Collection)</source><source>Alma/SFX Local Collection</source><creator>Zhang, En ; Zhu, Jun-Zhe ; Li, Gong-Li ; Chang, Jian ; Li, Yu</creator><contributor>Hussain, Mehdi ; Mehdi Hussain</contributor><creatorcontrib>Zhang, En ; Zhu, Jun-Zhe ; Li, Gong-Li ; Chang, Jian ; Li, Yu ; Hussain, Mehdi ; Mehdi Hussain</creatorcontrib><description>Secret sharing is a basic tool in modern communication, which protects privacy and provides information security. Among the secret sharing schemes, fairness is a vital and desirable property. To achieve fairness, the existing secret sharing schemes either require a trusted third party or the execution of a multiround protocol, which are impractical. Moreover, the classic scheme requires expensive computing in the secret verification phase. In this work, we provide an outsourcing hierarchical threshold secret sharing (HTSS) protocol based on reputation. In the scheme, participants from different levels can fairly reconstruct the secret, and the protocol only needs to run for one round. A cloud service provider (CSP) uses powerful computing resources to help participants complete homomorphic encryption and complex verification operations, and the CSP cannot be aware of any valuable information. The participants can obtain the secret with a small number of operations. To avoid collusion, we suppose that participants have their own reputation value, and they are punished or rewarded according to their behavior. The reputation value of a participant who deviates from the protocol will decrease; therefore, the participant will choose a cooperative strategy to obtain better payoffs. Lastly, our scheme is proved to be secure, and experiments indicate that our scheme is feasible and efficient.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2019/6989383</identifier><language>eng</language><publisher>London: Hindawi</publisher><subject>Access to information ; Cloud computing ; Encryption ; Outsourcing ; Power ; Privacy ; Protocol ; R&D ; Reputations ; Research & development ; Trusted third parties ; Verification</subject><ispartof>Security and communication networks, 2019-10, Vol.2019, p.1-8</ispartof><rights>Copyright © 2019 En Zhang et al.</rights><rights>Copyright © 2019 En Zhang et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. http://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c337t-aeeb4d8b87d358004772854eed6a9c9886117b5306b00f743f9d404dcbee851c3</citedby><cites>FETCH-LOGICAL-c337t-aeeb4d8b87d358004772854eed6a9c9886117b5306b00f743f9d404dcbee851c3</cites><orcidid>0000-0003-4106-6877</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><contributor>Hussain, Mehdi</contributor><contributor>Mehdi Hussain</contributor><creatorcontrib>Zhang, En</creatorcontrib><creatorcontrib>Zhu, Jun-Zhe</creatorcontrib><creatorcontrib>Li, Gong-Li</creatorcontrib><creatorcontrib>Chang, Jian</creatorcontrib><creatorcontrib>Li, Yu</creatorcontrib><title>Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation</title><title>Security and communication networks</title><description>Secret sharing is a basic tool in modern communication, which protects privacy and provides information security. Among the secret sharing schemes, fairness is a vital and desirable property. To achieve fairness, the existing secret sharing schemes either require a trusted third party or the execution of a multiround protocol, which are impractical. Moreover, the classic scheme requires expensive computing in the secret verification phase. In this work, we provide an outsourcing hierarchical threshold secret sharing (HTSS) protocol based on reputation. In the scheme, participants from different levels can fairly reconstruct the secret, and the protocol only needs to run for one round. A cloud service provider (CSP) uses powerful computing resources to help participants complete homomorphic encryption and complex verification operations, and the CSP cannot be aware of any valuable information. The participants can obtain the secret with a small number of operations. To avoid collusion, we suppose that participants have their own reputation value, and they are punished or rewarded according to their behavior. The reputation value of a participant who deviates from the protocol will decrease; therefore, the participant will choose a cooperative strategy to obtain better payoffs. Lastly, our scheme is proved to be secure, and experiments indicate that our scheme is feasible and efficient.</description><subject>Access to information</subject><subject>Cloud computing</subject><subject>Encryption</subject><subject>Outsourcing</subject><subject>Power</subject><subject>Privacy</subject><subject>Protocol</subject><subject>R&D</subject><subject>Reputations</subject><subject>Research & development</subject><subject>Trusted third parties</subject><subject>Verification</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp90EFLwzAUB_AgCs7pzQ8Q8Kh1SZM0yVHHdMJg4OY5pMmrzdjambSI396ODY-e3jv8-D_eH6FbSh4pFWKSE6onhVaaKXaGRlQznRGa5-d_O-WX6CqlDSEF5ZKP0GLZd6ntowvNJ54HiDa6Oji7xes6QqrbrccrcBE6vKptPKiVq2EH-Nkm8Lht8Dvs-852oW2u0UVltwluTnOMPl5m6-k8Wyxf36ZPi8wxJrvMApTcq1JJz4QihEuZK8EBfGG100oVlMpSMFKUhFSSs0p7Trh3JYAS1LExujvm7mP71UPqzGZ4oRlOmpwLIaUUhA3q4ahcbFOKUJl9DDsbfwwl5tCXOfRlTn0N_P7I69B4-x3-17_lp2mX</recordid><startdate>20191010</startdate><enddate>20191010</enddate><creator>Zhang, En</creator><creator>Zhu, Jun-Zhe</creator><creator>Li, Gong-Li</creator><creator>Chang, Jian</creator><creator>Li, Yu</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0003-4106-6877</orcidid></search><sort><creationdate>20191010</creationdate><title>Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation</title><author>Zhang, En ; Zhu, Jun-Zhe ; Li, Gong-Li ; Chang, Jian ; Li, Yu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c337t-aeeb4d8b87d358004772854eed6a9c9886117b5306b00f743f9d404dcbee851c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Access to information</topic><topic>Cloud computing</topic><topic>Encryption</topic><topic>Outsourcing</topic><topic>Power</topic><topic>Privacy</topic><topic>Protocol</topic><topic>R&D</topic><topic>Reputations</topic><topic>Research & development</topic><topic>Trusted third parties</topic><topic>Verification</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zhang, En</creatorcontrib><creatorcontrib>Zhu, Jun-Zhe</creatorcontrib><creatorcontrib>Li, Gong-Li</creatorcontrib><creatorcontrib>Chang, Jian</creatorcontrib><creatorcontrib>Li, Yu</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Access via ProQuest (Open Access)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zhang, En</au><au>Zhu, Jun-Zhe</au><au>Li, Gong-Li</au><au>Chang, Jian</au><au>Li, Yu</au><au>Hussain, Mehdi</au><au>Mehdi Hussain</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation</atitle><jtitle>Security and communication networks</jtitle><date>2019-10-10</date><risdate>2019</risdate><volume>2019</volume><spage>1</spage><epage>8</epage><pages>1-8</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>Secret sharing is a basic tool in modern communication, which protects privacy and provides information security. Among the secret sharing schemes, fairness is a vital and desirable property. To achieve fairness, the existing secret sharing schemes either require a trusted third party or the execution of a multiround protocol, which are impractical. Moreover, the classic scheme requires expensive computing in the secret verification phase. In this work, we provide an outsourcing hierarchical threshold secret sharing (HTSS) protocol based on reputation. In the scheme, participants from different levels can fairly reconstruct the secret, and the protocol only needs to run for one round. A cloud service provider (CSP) uses powerful computing resources to help participants complete homomorphic encryption and complex verification operations, and the CSP cannot be aware of any valuable information. The participants can obtain the secret with a small number of operations. To avoid collusion, we suppose that participants have their own reputation value, and they are punished or rewarded according to their behavior. The reputation value of a participant who deviates from the protocol will decrease; therefore, the participant will choose a cooperative strategy to obtain better payoffs. Lastly, our scheme is proved to be secure, and experiments indicate that our scheme is feasible and efficient.</abstract><cop>London</cop><pub>Hindawi</pub><doi>10.1155/2019/6989383</doi><tpages>8</tpages><orcidid>https://orcid.org/0000-0003-4106-6877</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-0114 |
ispartof | Security and communication networks, 2019-10, Vol.2019, p.1-8 |
issn | 1939-0114 1939-0122 |
language | eng |
recordid | cdi_proquest_journals_2455777503 |
source | EZB-FREE-00999 freely available EZB journals; Wiley Online Library (Open Access Collection); Alma/SFX Local Collection |
subjects | Access to information Cloud computing Encryption Outsourcing Power Privacy Protocol R&D Reputations Research & development Trusted third parties Verification |
title | Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T06%3A08%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Outsourcing%20Hierarchical%20Threshold%20Secret%20Sharing%20Scheme%20Based%20on%20Reputation&rft.jtitle=Security%20and%20communication%20networks&rft.au=Zhang,%20En&rft.date=2019-10-10&rft.volume=2019&rft.spage=1&rft.epage=8&rft.pages=1-8&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2019/6989383&rft_dat=%3Cproquest_cross%3E2455777503%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2455777503&rft_id=info:pmid/&rfr_iscdi=true |