access structures
Recently Published Documents


TOTAL DOCUMENTS

229
(FIVE YEARS 44)

H-INDEX

18
(FIVE YEARS 4)

2021 ◽  
pp. 1-34
Author(s):  
Jannik Dreier ◽  
Jean-Guillaume Dumas ◽  
Pascal Lafourcade ◽  
Léo Robert

In 1968, Liu described the problem of securing documents in a shared secret project. In an example, at least six out of eleven participating scientists need to be present to open the lock securing the secret documents. Shamir proposed a mathematical solution to this physical problem in 1979, by designing an efficient k-out-of-n secret sharing scheme based on Lagrange’s interpolation. Liu and Shamir also claimed that the minimal solution using physical locks is clearly impractical and exponential in the number of participants. In this paper we relax some implicit assumptions in their claim and propose an optimal physical solution to the problem of Liu that uses physical padlocks, but the number of padlocks is not greater than the number of participants. Then, we show that no device can do better for k-out-of-n threshold padlock systems as soon as k ⩾ 2 n , which holds true in particular for Liu’s example. More generally, we derive bounds required to implement any threshold system and prove a lower bound of O ( log ( n ) ) padlocks for any threshold larger than 2. For instance we propose an optimal scheme reaching that bound for 2-out-of-n threshold systems and requiring less than 2 log 2 ( n ) padlocks. We also discuss more complex access structures, a wrapping technique, and other sublinear realizations like an algorithm to generate 3-out-of-n systems with 2.5 n padlocks. Finally we give an algorithm building k-out-of-n threshold padlock systems with only O ( log ( n ) k − 1 ) padlocks. Apart from the physical world, our results also show that it is possible to implement secret sharing over small fields.


Author(s):  
Luis Ramos Pinto ◽  
Luis Almeida

Unmanned Aerial Vehicles (UAVs) in particular multirotors are becoming the {\it de facto} tool for aerial sensing and remote inspection. In large industrial facilities, a UAV can transmit an online video stream to inspect difficult to access structures, such chimneys, deposits and towers. However, the communication range is limited, constraining the UAV operation range. This limitation can be overcome with relaying UAVs placed between the source UAV and the control station, creating a line of communication links. In this work we assume the use of a digital data packet network technology, namely WiFi, and tackle the problem of defining the exact placement for the relaying UAVs that creates an end-to-end channel with maximal delivery of data packets. We consider asymmetric communication links and we show an increase as large as $15$\% in end-to-end packet delivery ratio when compared to an equidistant placement. We also discuss the deployment of such a network and propose a fully distributed method that converges to the global optimal relay positions taking, on average, 1.4 the time taken by a centralized method.


2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Yang Ba ◽  
Xuexian Hu ◽  
Yue Chen ◽  
Zenghang Hao ◽  
Xuewei Li ◽  
...  

Data sharing has become a key technology to break down data silos in the big data era. Ciphertext-policy attribute-based encryption (CP-ABE) is widely used in secure data-sharing schemes to realize flexible and fine-grained access control. However, in traditional CP-ABE schemes, the access structure is directly shared along with the ciphertext, potentially leading to users’ private information leakage. Outsourcing data to a centralized third party can easily result in privacy leakage and single-point bottlenecks, and the lack of transparency in data storage and sharing casts doubts whether users’ data are safe. To address these issues, we propose a blockchain-based CP-ABE scheme with partially hidden access structures (BCP-ABE-PHAS) to achieve fine-grained access control while ensuring user privacy. First, we propose an efficient CP-ABE scheme with partially hidden access structures, where the ciphertext size is constant. To assist data decryption, we design a garbled Bloom filter to help users quickly locate the position of wildcards in the access structure. Then, to improve storage efficiency and system scalability, we propose a data storage scheme that combines blockchain technology and the interplanetary file system, ensuring data integrity. Finally, we employ smart contracts for a transparent data storage and sharing process without third-party participation. Security analysis and performance evaluation show that the proposed BCP-ABE-PHAS scheme can preserve policy privacy with efficient storage and low computational overhead.


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Zhenjie Huang ◽  
Runlong Duan ◽  
Qunshan Chen ◽  
Hui Huang ◽  
Yuping Zhou

Outsourced attribute-based signatures (OABS) enable users to sign messages without revealing specific identity information and are suitable for scenarios with limited computing power. Recently, Mo et al. proposed an expressive outsourced attribute-based signature scheme (Peer-to-Peer Networking and Applications, 11, 2017). In this paper, we show that Mo et al.’s scheme does not achieve any of the three security properties. Their scheme is incorrect. The adversary can collude with the malicious signing-cloud service provider (S-CSP) to forge valid signatures on any message and any attribute set. And the S-CSP could trace the access structures used to generate the signatures. Then, we treat the S-CSP as an adversary and present more accurate unforgeability and anonymity models for OABS to remedy the drawbacks of the previous ones. Finally, we propose a simple but significant improvement to fix our attacks. The improved scheme achieves correctness, unforgeability, and perfect anonymity while keeping the efficiency almost unchanged. We also prove the security of the improved scheme under the standard model.


2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Guoai Xu ◽  
Jiangtao Yuan ◽  
Guosheng Xu ◽  
Zhongkai Dang

Multipartite secret sharing schemes are those that have multipartite access structures. The set of the participants in those schemes is divided into several parts, and all the participants in the same part play the equivalent role. One type of such access structure is the compartmented access structure, and the other is the hierarchical access structure. We propose an efficient compartmented multisecret sharing scheme based on the linear homogeneous recurrence (LHR) relations. In the construction phase, the shared secrets are hidden in some terms of the linear homogeneous recurrence sequence. In the recovery phase, the shared secrets are obtained by solving those terms in which the shared secrets are hidden. When the global threshold is t , our scheme can reduce the computational complexity of the compartmented secret sharing schemes from the exponential time to polynomial time. The security of the proposed scheme is based on Shamir’s threshold scheme, i.e., our scheme is perfect and ideal. Moreover, it is efficient to share the multisecret and to change the shared secrets in the proposed scheme.


2021 ◽  
Vol 0 (0) ◽  
pp. 0
Author(s):  
Reza Kaboli ◽  
Shahram Khazaei ◽  
Maghsoud Parviz

Sign in / Sign up

Export Citation Format

Share Document