By Topic

A Proactive Secret Sharing Scheme Based on Elliptic Curve Cryptography

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Hua Sun ; Sch. of Inf. Eng., Univ. of Sci. & Technol. Beijing Beijing, Beijing ; Xuefeng Zheng ; Yike Yu

For long-lived and sensitive secrets, it is insufficient to apply the classic cryptography as well as ( ) threshold cryptosystem. Only proactive secret sharing can properly protect them, where the shares are periodically renewed without changing the secret. Hence, the adversary willing to learn the secret needs to break up or more shareholders in the same time period. If the time period and the threshold value are selected properly, proactive secret sharing can maintain the overall security of the information. This article presents a proactive verifiable secret sharing scheme based on elliptic curve cryptosystem, which is secure and effective.

Published in:

Education Technology and Computer Science, 2009. ETCS '09. First International Workshop on  (Volume:2 )

Date of Conference:

7-8 March 2009