Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation

Secret sharing is a basic tool in modern communication, which protects privacy and provides information security. Among the secret sharing schemes, fairness is a vital and desirable property. To achieve fairness, the existing secret sharing schemes either require a trusted third party or the executi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Security and communication networks 2019-10, Vol.2019, p.1-8
Hauptverfasser: Zhang, En, Zhu, Jun-Zhe, Li, Gong-Li, Chang, Jian, Li, Yu
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 8
container_issue
container_start_page 1
container_title Security and communication networks
container_volume 2019
creator Zhang, En
Zhu, Jun-Zhe
Li, Gong-Li
Chang, Jian
Li, Yu
description Secret sharing is a basic tool in modern communication, which protects privacy and provides information security. Among the secret sharing schemes, fairness is a vital and desirable property. To achieve fairness, the existing secret sharing schemes either require a trusted third party or the execution of a multiround protocol, which are impractical. Moreover, the classic scheme requires expensive computing in the secret verification phase. In this work, we provide an outsourcing hierarchical threshold secret sharing (HTSS) protocol based on reputation. In the scheme, participants from different levels can fairly reconstruct the secret, and the protocol only needs to run for one round. A cloud service provider (CSP) uses powerful computing resources to help participants complete homomorphic encryption and complex verification operations, and the CSP cannot be aware of any valuable information. The participants can obtain the secret with a small number of operations. To avoid collusion, we suppose that participants have their own reputation value, and they are punished or rewarded according to their behavior. The reputation value of a participant who deviates from the protocol will decrease; therefore, the participant will choose a cooperative strategy to obtain better payoffs. Lastly, our scheme is proved to be secure, and experiments indicate that our scheme is feasible and efficient.
doi_str_mv 10.1155/2019/6989383
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2455777503</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2455777503</sourcerecordid><originalsourceid>FETCH-LOGICAL-c337t-aeeb4d8b87d358004772854eed6a9c9886117b5306b00f743f9d404dcbee851c3</originalsourceid><addsrcrecordid>eNp90EFLwzAUB_AgCs7pzQ8Q8Kh1SZM0yVHHdMJg4OY5pMmrzdjambSI396ODY-e3jv8-D_eH6FbSh4pFWKSE6onhVaaKXaGRlQznRGa5-d_O-WX6CqlDSEF5ZKP0GLZd6ntowvNJ54HiDa6Oji7xes6QqrbrccrcBE6vKptPKiVq2EH-Nkm8Lht8Dvs-852oW2u0UVltwluTnOMPl5m6-k8Wyxf36ZPi8wxJrvMApTcq1JJz4QihEuZK8EBfGG100oVlMpSMFKUhFSSs0p7Trh3JYAS1LExujvm7mP71UPqzGZ4oRlOmpwLIaUUhA3q4ahcbFOKUJl9DDsbfwwl5tCXOfRlTn0N_P7I69B4-x3-17_lp2mX</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2455777503</pqid></control><display><type>article</type><title>Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation</title><source>EZB-FREE-00999 freely available EZB journals</source><source>Wiley Online Library (Open Access Collection)</source><source>Alma/SFX Local Collection</source><creator>Zhang, En ; Zhu, Jun-Zhe ; Li, Gong-Li ; Chang, Jian ; Li, Yu</creator><contributor>Hussain, Mehdi ; Mehdi Hussain</contributor><creatorcontrib>Zhang, En ; Zhu, Jun-Zhe ; Li, Gong-Li ; Chang, Jian ; Li, Yu ; Hussain, Mehdi ; Mehdi Hussain</creatorcontrib><description>Secret sharing is a basic tool in modern communication, which protects privacy and provides information security. Among the secret sharing schemes, fairness is a vital and desirable property. To achieve fairness, the existing secret sharing schemes either require a trusted third party or the execution of a multiround protocol, which are impractical. Moreover, the classic scheme requires expensive computing in the secret verification phase. In this work, we provide an outsourcing hierarchical threshold secret sharing (HTSS) protocol based on reputation. In the scheme, participants from different levels can fairly reconstruct the secret, and the protocol only needs to run for one round. A cloud service provider (CSP) uses powerful computing resources to help participants complete homomorphic encryption and complex verification operations, and the CSP cannot be aware of any valuable information. The participants can obtain the secret with a small number of operations. To avoid collusion, we suppose that participants have their own reputation value, and they are punished or rewarded according to their behavior. The reputation value of a participant who deviates from the protocol will decrease; therefore, the participant will choose a cooperative strategy to obtain better payoffs. Lastly, our scheme is proved to be secure, and experiments indicate that our scheme is feasible and efficient.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2019/6989383</identifier><language>eng</language><publisher>London: Hindawi</publisher><subject>Access to information ; Cloud computing ; Encryption ; Outsourcing ; Power ; Privacy ; Protocol ; R&amp;D ; Reputations ; Research &amp; development ; Trusted third parties ; Verification</subject><ispartof>Security and communication networks, 2019-10, Vol.2019, p.1-8</ispartof><rights>Copyright © 2019 En Zhang et al.</rights><rights>Copyright © 2019 En Zhang et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. http://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c337t-aeeb4d8b87d358004772854eed6a9c9886117b5306b00f743f9d404dcbee851c3</citedby><cites>FETCH-LOGICAL-c337t-aeeb4d8b87d358004772854eed6a9c9886117b5306b00f743f9d404dcbee851c3</cites><orcidid>0000-0003-4106-6877</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><contributor>Hussain, Mehdi</contributor><contributor>Mehdi Hussain</contributor><creatorcontrib>Zhang, En</creatorcontrib><creatorcontrib>Zhu, Jun-Zhe</creatorcontrib><creatorcontrib>Li, Gong-Li</creatorcontrib><creatorcontrib>Chang, Jian</creatorcontrib><creatorcontrib>Li, Yu</creatorcontrib><title>Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation</title><title>Security and communication networks</title><description>Secret sharing is a basic tool in modern communication, which protects privacy and provides information security. Among the secret sharing schemes, fairness is a vital and desirable property. To achieve fairness, the existing secret sharing schemes either require a trusted third party or the execution of a multiround protocol, which are impractical. Moreover, the classic scheme requires expensive computing in the secret verification phase. In this work, we provide an outsourcing hierarchical threshold secret sharing (HTSS) protocol based on reputation. In the scheme, participants from different levels can fairly reconstruct the secret, and the protocol only needs to run for one round. A cloud service provider (CSP) uses powerful computing resources to help participants complete homomorphic encryption and complex verification operations, and the CSP cannot be aware of any valuable information. The participants can obtain the secret with a small number of operations. To avoid collusion, we suppose that participants have their own reputation value, and they are punished or rewarded according to their behavior. The reputation value of a participant who deviates from the protocol will decrease; therefore, the participant will choose a cooperative strategy to obtain better payoffs. Lastly, our scheme is proved to be secure, and experiments indicate that our scheme is feasible and efficient.</description><subject>Access to information</subject><subject>Cloud computing</subject><subject>Encryption</subject><subject>Outsourcing</subject><subject>Power</subject><subject>Privacy</subject><subject>Protocol</subject><subject>R&amp;D</subject><subject>Reputations</subject><subject>Research &amp; development</subject><subject>Trusted third parties</subject><subject>Verification</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp90EFLwzAUB_AgCs7pzQ8Q8Kh1SZM0yVHHdMJg4OY5pMmrzdjambSI396ODY-e3jv8-D_eH6FbSh4pFWKSE6onhVaaKXaGRlQznRGa5-d_O-WX6CqlDSEF5ZKP0GLZd6ntowvNJ54HiDa6Oji7xes6QqrbrccrcBE6vKptPKiVq2EH-Nkm8Lht8Dvs-852oW2u0UVltwluTnOMPl5m6-k8Wyxf36ZPi8wxJrvMApTcq1JJz4QihEuZK8EBfGG100oVlMpSMFKUhFSSs0p7Trh3JYAS1LExujvm7mP71UPqzGZ4oRlOmpwLIaUUhA3q4ahcbFOKUJl9DDsbfwwl5tCXOfRlTn0N_P7I69B4-x3-17_lp2mX</recordid><startdate>20191010</startdate><enddate>20191010</enddate><creator>Zhang, En</creator><creator>Zhu, Jun-Zhe</creator><creator>Li, Gong-Li</creator><creator>Chang, Jian</creator><creator>Li, Yu</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0003-4106-6877</orcidid></search><sort><creationdate>20191010</creationdate><title>Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation</title><author>Zhang, En ; Zhu, Jun-Zhe ; Li, Gong-Li ; Chang, Jian ; Li, Yu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c337t-aeeb4d8b87d358004772854eed6a9c9886117b5306b00f743f9d404dcbee851c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Access to information</topic><topic>Cloud computing</topic><topic>Encryption</topic><topic>Outsourcing</topic><topic>Power</topic><topic>Privacy</topic><topic>Protocol</topic><topic>R&amp;D</topic><topic>Reputations</topic><topic>Research &amp; development</topic><topic>Trusted third parties</topic><topic>Verification</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zhang, En</creatorcontrib><creatorcontrib>Zhu, Jun-Zhe</creatorcontrib><creatorcontrib>Li, Gong-Li</creatorcontrib><creatorcontrib>Chang, Jian</creatorcontrib><creatorcontrib>Li, Yu</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Access via ProQuest (Open Access)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zhang, En</au><au>Zhu, Jun-Zhe</au><au>Li, Gong-Li</au><au>Chang, Jian</au><au>Li, Yu</au><au>Hussain, Mehdi</au><au>Mehdi Hussain</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation</atitle><jtitle>Security and communication networks</jtitle><date>2019-10-10</date><risdate>2019</risdate><volume>2019</volume><spage>1</spage><epage>8</epage><pages>1-8</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>Secret sharing is a basic tool in modern communication, which protects privacy and provides information security. Among the secret sharing schemes, fairness is a vital and desirable property. To achieve fairness, the existing secret sharing schemes either require a trusted third party or the execution of a multiround protocol, which are impractical. Moreover, the classic scheme requires expensive computing in the secret verification phase. In this work, we provide an outsourcing hierarchical threshold secret sharing (HTSS) protocol based on reputation. In the scheme, participants from different levels can fairly reconstruct the secret, and the protocol only needs to run for one round. A cloud service provider (CSP) uses powerful computing resources to help participants complete homomorphic encryption and complex verification operations, and the CSP cannot be aware of any valuable information. The participants can obtain the secret with a small number of operations. To avoid collusion, we suppose that participants have their own reputation value, and they are punished or rewarded according to their behavior. The reputation value of a participant who deviates from the protocol will decrease; therefore, the participant will choose a cooperative strategy to obtain better payoffs. Lastly, our scheme is proved to be secure, and experiments indicate that our scheme is feasible and efficient.</abstract><cop>London</cop><pub>Hindawi</pub><doi>10.1155/2019/6989383</doi><tpages>8</tpages><orcidid>https://orcid.org/0000-0003-4106-6877</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1939-0114
ispartof Security and communication networks, 2019-10, Vol.2019, p.1-8
issn 1939-0114
1939-0122
language eng
recordid cdi_proquest_journals_2455777503
source EZB-FREE-00999 freely available EZB journals; Wiley Online Library (Open Access Collection); Alma/SFX Local Collection
subjects Access to information
Cloud computing
Encryption
Outsourcing
Power
Privacy
Protocol
R&D
Reputations
Research & development
Trusted third parties
Verification
title Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T06%3A08%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Outsourcing%20Hierarchical%20Threshold%20Secret%20Sharing%20Scheme%20Based%20on%20Reputation&rft.jtitle=Security%20and%20communication%20networks&rft.au=Zhang,%20En&rft.date=2019-10-10&rft.volume=2019&rft.spage=1&rft.epage=8&rft.pages=1-8&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2019/6989383&rft_dat=%3Cproquest_cross%3E2455777503%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2455777503&rft_id=info:pmid/&rfr_iscdi=true