Javascript must be enabled to continue!
Attribute-based publicly verifiable secret sharing
View through CrossRef
Abstract
Can a dealer share a secret without knowing the shareholders? We provide a positive answer to this question by introducing the concept of an attribute-based secret sharing (AB-SS) scheme.With AB-SS, a dealer can distribute a secret based on attributes rather than specific individuals or shareholders. Only authorized users whose attributes satisfy a given access structure can recover the secret. Furthermore, we introduce the concept of attribute-based publicly verifiable secret sharing (AB-PVSS). An AB-PVSS scheme allows external users to verify the correctness of all broadcast messages from the dealer and shareholders, similar to a traditional PVSS scheme. Additionally, AB-SS (or AB-PVSS) distinguishes itself from traditional SS (or PVSS) by enabling a dealer to generate shares according to an arbitrary monotone access structure.To build an AB-PVSS scheme, we first implement a decentralized ciphertext-policy attribute-based encryption (CP-ABE) scheme, though not a fully-fledged one.We then incorporate non-interactive zero-knowledge (NIZK) proofs to enable public verification of the CP-ABE ciphertext. Based on the CP-ABE and NIZK proofs, we construct an AB-PVSS primitive.Finally, we conduct security analysis and comprehensive experiments on the proposed CP-ABE and AB-PVSS schemes. The results demonstrate that both schemes exhibit plausible performance compared to related works.
Springer Science and Business Media LLC
Title: Attribute-based publicly verifiable secret sharing
Description:
Abstract
Can a dealer share a secret without knowing the shareholders? We provide a positive answer to this question by introducing the concept of an attribute-based secret sharing (AB-SS) scheme.
With AB-SS, a dealer can distribute a secret based on attributes rather than specific individuals or shareholders.
Only authorized users whose attributes satisfy a given access structure can recover the secret.
Furthermore, we introduce the concept of attribute-based publicly verifiable secret sharing (AB-PVSS).
An AB-PVSS scheme allows external users to verify the correctness of all broadcast messages from the dealer and shareholders, similar to a traditional PVSS scheme.
Additionally, AB-SS (or AB-PVSS) distinguishes itself from traditional SS (or PVSS) by enabling a dealer to generate shares according to an arbitrary monotone access structure.
To build an AB-PVSS scheme, we first implement a decentralized ciphertext-policy attribute-based encryption (CP-ABE) scheme, though not a fully-fledged one.
We then incorporate non-interactive zero-knowledge (NIZK) proofs to enable public verification of the CP-ABE ciphertext.
Based on the CP-ABE and NIZK proofs, we construct an AB-PVSS primitive.
Finally, we conduct security analysis and comprehensive experiments on the proposed CP-ABE and AB-PVSS schemes.
The results demonstrate that both schemes exhibit plausible performance compared to related works.
Related Results
Verifiable secret sharing based on the Chinese remainder theorem
Verifiable secret sharing based on the Chinese remainder theorem
ABSTRACTA (t,n) secret sharing scheme (SS) enables a dealer to divide a secret into n shares in such a way that (i) the secret can be recovered successfully with t or more than t s...
Are Joint Controllers Joint Trade Secret Owners? What EU Data Protection and US Information Privacy Law Tell Us About Trade Secret Law
Are Joint Controllers Joint Trade Secret Owners? What EU Data Protection and US Information Privacy Law Tell Us About Trade Secret Law
The article focusses on (joint) trade secret ownership as a (neglected) aspect of European Union (EU) and United States (US) Trade Secret Law. The article shows that Information Pr...
Text image secret sharing with hiding based on color feature
Text image secret sharing with hiding based on color feature
The Secret Sharing is a scheme for sharing data into n pieces using (k, n) threshold method. Secret Sharing becomes an efficient method to ensure secure data transmission. Some vis...
Optimal Double Layer Secret Sharing Scheme for Biometrics
Optimal Double Layer Secret Sharing Scheme for Biometrics
Visual secret sharing (VSS) method is an encryption method to ensure the Security of secret data, that just performs the partitioning of ‘n’ shares and distributes among ‘n’ users ...
Non-Recommended Publishing Lists: Strategies for Detecting Deceitful Journals
Non-Recommended Publishing Lists: Strategies for Detecting Deceitful Journals
Abstract
The rapid growth of open access publishing (OAP) has significantly improved the accessibility and dissemination of scientific knowledge. However, this expansion has also c...
Le secret bancaire. Etude de droit comparé (France-Suisse)
Le secret bancaire. Etude de droit comparé (France-Suisse)
Si le secret bancaire helvétique fait régulièrement l'objet de virulentes critiques et attaques sur le plan de la scène politique internationale, à chaque crise, un constat s'impos...
Attribute Categorization and Layering Effects on Product Design Evaluations
Attribute Categorization and Layering Effects on Product Design Evaluations
Although convergence of attributes has been frequently applied as a product development strategy, its effects on consumers’ perceptions of product capabilities (PC) and usability (...
The impact of employees’ relationships on tacit knowledge sharing
The impact of employees’ relationships on tacit knowledge sharing
Purpose– This paper aims to study the impact of individual relationships on tacit knowledge sharing in the company setting of compulsory bond, expressive bond, instrumental bond an...

