Efficient Dynamic-Resharing “Verifiable Secret Sharing” against mobile adversary View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

1995

AUTHORS

Noga Alon , Zvi Galil , Moti Yung

ABSTRACT

VSS enables a dealer to distribute its secret to a set of trustees, so that they are assured that the sharing is valid and that they can open it later, and further no small group of trustees can open it prematurely. Recently, such sharing of cryptographic tools gained much attention, e.g., in the context of “key escrow cryptography” where a user enables a group of trustees to potentially open its information (when authorized by the court). Our dynamic-sharing VSS allows for mobile adversary attacking different sets of trustees at different time periods (modeling, e.g., network viruses that get spread as well as get eliminated). Technically, we concentrate on simple direct methods that are combinatorial and number-theoretic in nature, and employ only simple public-key functions. (All previous schemes withstanding linear number of faults embedded secrets in polynomials which we do not do). In addition, our protocols are constant round. The work is a sequence of reductions. We reduce t(t(1/2−ε)) out-of n VSS from n out-of n one (assuming ex-or homomorphic encryption), then we reduce dynamic resharing (by the dealer) VSS from the static VSS, finally we reduce proactive VSS (dynamic VSS with no dealer presence after the initial sharing) from our dynamic resharing VSS. More... »

PAGES

523-537

Book

TITLE

Algorithms — ESA '95

ISBN

978-3-540-60313-9
978-3-540-44913-3

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/3-540-60313-1_168

DOI

http://dx.doi.org/10.1007/3-540-60313-1_168

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1019545369


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Tel Aviv University", 
          "id": "https://www.grid.ac/institutes/grid.12136.37", 
          "name": [
            "Tel-Aviv University, Israel"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Alon", 
        "givenName": "Noga", 
        "id": "sg:person.0765221225.03", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0765221225.03"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Columbia University", 
          "id": "https://www.grid.ac/institutes/grid.21729.3f", 
          "name": [
            "Columbia University, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Galil", 
        "givenName": "Zvi", 
        "id": "sg:person.0675716504.71", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0675716504.71"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "IBM Research \u2013 Thomas J. Watson Research Center", 
          "id": "https://www.grid.ac/institutes/grid.481554.9", 
          "name": [
            "IBM T. J. Watson Research Center, Yorktown Heights, NY"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Yung", 
        "givenName": "Moti", 
        "id": "sg:person.016677435253.49", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016677435253.49"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1016/0022-0000(84)90070-9", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1035604833"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "1995", 
    "datePublishedReg": "1995-01-01", 
    "description": "VSS enables a dealer to distribute its secret to a set of trustees, so that they are assured that the sharing is valid and that they can open it later, and further no small group of trustees can open it prematurely. Recently, such sharing of cryptographic tools gained much attention, e.g., in the context of \u201ckey escrow cryptography\u201d where a user enables a group of trustees to potentially open its information (when authorized by the court). Our dynamic-sharing VSS allows for mobile adversary attacking different sets of trustees at different time periods (modeling, e.g., network viruses that get spread as well as get eliminated). Technically, we concentrate on simple direct methods that are combinatorial and number-theoretic in nature, and employ only simple public-key functions. (All previous schemes withstanding linear number of faults embedded secrets in polynomials which we do not do). In addition, our protocols are constant round. The work is a sequence of reductions. We reduce t(t(1/2\u2212\u03b5)) out-of n VSS from n out-of n one (assuming ex-or homomorphic encryption), then we reduce dynamic resharing (by the dealer) VSS from the static VSS, finally we reduce proactive VSS (dynamic VSS with no dealer presence after the initial sharing) from our dynamic resharing VSS.", 
    "editor": [
      {
        "familyName": "Spirakis", 
        "givenName": "Paul", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/3-540-60313-1_168", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isFundedItemOf": [
      {
        "id": "sg:grant.3388542", 
        "type": "MonetaryGrant"
      }, 
      {
        "id": "sg:grant.3417312", 
        "type": "MonetaryGrant"
      }
    ], 
    "isPartOf": {
      "isbn": [
        "978-3-540-60313-9", 
        "978-3-540-44913-3"
      ], 
      "name": "Algorithms \u2014 ESA '95", 
      "type": "Book"
    }, 
    "name": "Efficient Dynamic-Resharing \u201cVerifiable Secret Sharing\u201d against mobile adversary", 
    "pagination": "523-537", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/3-540-60313-1_168"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "5d206ae773f2637f0a1186f1c3f4e8002ca81be6404712f780b6d8de1bf3a345"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1019545369"
        ]
      }
    ], 
    "publisher": {
      "location": "Berlin, Heidelberg", 
      "name": "Springer Berlin Heidelberg", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/3-540-60313-1_168", 
      "https://app.dimensions.ai/details/publication/pub.1019545369"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-16T00:48", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8700_00000255.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/3-540-60313-1_168"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/3-540-60313-1_168'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/3-540-60313-1_168'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/3-540-60313-1_168'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/3-540-60313-1_168'


 

This table displays all metadata directly associated to this object as RDF triples.

92 TRIPLES      23 PREDICATES      28 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/3-540-60313-1_168 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author Na4308a174df34623aa5a4d2613e38db5
4 schema:citation https://doi.org/10.1016/0022-0000(84)90070-9
5 schema:datePublished 1995
6 schema:datePublishedReg 1995-01-01
7 schema:description VSS enables a dealer to distribute its secret to a set of trustees, so that they are assured that the sharing is valid and that they can open it later, and further no small group of trustees can open it prematurely. Recently, such sharing of cryptographic tools gained much attention, e.g., in the context of “key escrow cryptography” where a user enables a group of trustees to potentially open its information (when authorized by the court). Our dynamic-sharing VSS allows for mobile adversary attacking different sets of trustees at different time periods (modeling, e.g., network viruses that get spread as well as get eliminated). Technically, we concentrate on simple direct methods that are combinatorial and number-theoretic in nature, and employ only simple public-key functions. (All previous schemes withstanding linear number of faults embedded secrets in polynomials which we do not do). In addition, our protocols are constant round. The work is a sequence of reductions. We reduce t(t(1/2−ε)) out-of n VSS from n out-of n one (assuming ex-or homomorphic encryption), then we reduce dynamic resharing (by the dealer) VSS from the static VSS, finally we reduce proactive VSS (dynamic VSS with no dealer presence after the initial sharing) from our dynamic resharing VSS.
8 schema:editor N211fe660477b4cd68031a0534240680e
9 schema:genre chapter
10 schema:inLanguage en
11 schema:isAccessibleForFree false
12 schema:isPartOf N08e0c63f018547e5bdd3ed4dac7375e2
13 schema:name Efficient Dynamic-Resharing “Verifiable Secret Sharing” against mobile adversary
14 schema:pagination 523-537
15 schema:productId N1565011531204daf84e38175caa4276c
16 N2c2a989ecd18470bbbe2268791603272
17 Ncaf5f3adbeb140578768227edb43b709
18 schema:publisher N627df2bdbdc94237961ca9a819fadd70
19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1019545369
20 https://doi.org/10.1007/3-540-60313-1_168
21 schema:sdDatePublished 2019-04-16T00:48
22 schema:sdLicense https://scigraph.springernature.com/explorer/license/
23 schema:sdPublisher N1dd91a0882e143a6b0e154a681e7af83
24 schema:url http://link.springer.com/10.1007/3-540-60313-1_168
25 sgo:license sg:explorer/license/
26 sgo:sdDataset chapters
27 rdf:type schema:Chapter
28 N08e0c63f018547e5bdd3ed4dac7375e2 schema:isbn 978-3-540-44913-3
29 978-3-540-60313-9
30 schema:name Algorithms — ESA '95
31 rdf:type schema:Book
32 N1565011531204daf84e38175caa4276c schema:name dimensions_id
33 schema:value pub.1019545369
34 rdf:type schema:PropertyValue
35 N1dd91a0882e143a6b0e154a681e7af83 schema:name Springer Nature - SN SciGraph project
36 rdf:type schema:Organization
37 N211fe660477b4cd68031a0534240680e rdf:first N36f237cdc63c486abf0a556f05e4b326
38 rdf:rest rdf:nil
39 N2c2a989ecd18470bbbe2268791603272 schema:name doi
40 schema:value 10.1007/3-540-60313-1_168
41 rdf:type schema:PropertyValue
42 N36f237cdc63c486abf0a556f05e4b326 schema:familyName Spirakis
43 schema:givenName Paul
44 rdf:type schema:Person
45 N627df2bdbdc94237961ca9a819fadd70 schema:location Berlin, Heidelberg
46 schema:name Springer Berlin Heidelberg
47 rdf:type schema:Organisation
48 Na4308a174df34623aa5a4d2613e38db5 rdf:first sg:person.0765221225.03
49 rdf:rest Nb0bb7ff665a94f4d8b685e02036f489f
50 Nb0bb7ff665a94f4d8b685e02036f489f rdf:first sg:person.0675716504.71
51 rdf:rest Nd8c9cb015caa46078b4de31e04310594
52 Ncaf5f3adbeb140578768227edb43b709 schema:name readcube_id
53 schema:value 5d206ae773f2637f0a1186f1c3f4e8002ca81be6404712f780b6d8de1bf3a345
54 rdf:type schema:PropertyValue
55 Nd8c9cb015caa46078b4de31e04310594 rdf:first sg:person.016677435253.49
56 rdf:rest rdf:nil
57 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
58 schema:name Information and Computing Sciences
59 rdf:type schema:DefinedTerm
60 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
61 schema:name Data Format
62 rdf:type schema:DefinedTerm
63 sg:grant.3388542 http://pending.schema.org/fundedItem sg:pub.10.1007/3-540-60313-1_168
64 rdf:type schema:MonetaryGrant
65 sg:grant.3417312 http://pending.schema.org/fundedItem sg:pub.10.1007/3-540-60313-1_168
66 rdf:type schema:MonetaryGrant
67 sg:person.016677435253.49 schema:affiliation https://www.grid.ac/institutes/grid.481554.9
68 schema:familyName Yung
69 schema:givenName Moti
70 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016677435253.49
71 rdf:type schema:Person
72 sg:person.0675716504.71 schema:affiliation https://www.grid.ac/institutes/grid.21729.3f
73 schema:familyName Galil
74 schema:givenName Zvi
75 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0675716504.71
76 rdf:type schema:Person
77 sg:person.0765221225.03 schema:affiliation https://www.grid.ac/institutes/grid.12136.37
78 schema:familyName Alon
79 schema:givenName Noga
80 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0765221225.03
81 rdf:type schema:Person
82 https://doi.org/10.1016/0022-0000(84)90070-9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1035604833
83 rdf:type schema:CreativeWork
84 https://www.grid.ac/institutes/grid.12136.37 schema:alternateName Tel Aviv University
85 schema:name Tel-Aviv University, Israel
86 rdf:type schema:Organization
87 https://www.grid.ac/institutes/grid.21729.3f schema:alternateName Columbia University
88 schema:name Columbia University, USA
89 rdf:type schema:Organization
90 https://www.grid.ac/institutes/grid.481554.9 schema:alternateName IBM Research – Thomas J. Watson Research Center
91 schema:name IBM T. J. Watson Research Center, Yorktown Heights, NY
92 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...