Journal of Systems Engineering and Electronics ›› 2006, Vol. 17 ›› Issue (4): 916-918.doi: 10.1016/S1004-4132(07)60037-1
• SOFTWARE ALGORITHM AND SIMULATION • Previous Articles Next Articles
Ye Zhenjun1 & Meng Fanzhen2
Online:
Published:
Abstract:
To assure the shareholders can look for their "legal" attorneys to renew the secret, once the secret sharing scheme is initialized, a secret sharing scheme with inherited characteristic is constructed. In this scheme, each shareholder can produce a new share by his algorithm, which is equivalent to the primary one. Together with other shares, the primary secret can be renewed. Since this scheme is constructed not by replacing the primary share with a new share produced by the dealer in his primitive secret sharing scheme, so no matter how much shares the shareholder produces, these shares can not be gathered together to renew the secret in this scheme. Compared with the existing secret sharing schemes, this scheme provides more agility for the shareholders by investing each of them a function but not affect its security.
Key words: cryptography, secret sharing scheme, inherited, equivalent class.
Ye Zhenjun & Meng Fanzhen.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jseepub.com/EN/10.1016/S1004-4132(07)60037-1
https://www.jseepub.com/EN/Y2006/V17/I4/916