Skip to main content

On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure

  • Conference paper
  • First Online:
Progress in Cryptology — INDOCRYPT 2002 (INDOCRYPT 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2551))

Included in the following conference series:

Abstract

A Key Distribution Center of a network is a server enabling private communications within groups of users. A Distributed Key Distribution Center is a set of servers that jointly realizes a Key Distribution Center. In this paper we build a robust Distributed Key Distribution Center Scheme secure against active and mobile adversary. We consider a general access structure for the set of servers and for the adversary access structure. We also revise the unconditionally secure Verifiable Secret Sharing Schemes from [11],[10],[19],[22]proposing a modified version which is proactively secure.

The author was partially supported by NATO research fellowship and Concerted Research Action GOA-MEFISTO-666 of the Flemish Government.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. G.R. Blakley, Safeguarding cryptographic keys, AFIPS Conference Proc. 48, 1979, pp. 313–317.

    Google Scholar 

  2. G.R. Blakley, G.A. Kabatianskii, Linear Algebra Approach to Secret Sharing Schemes, Springer Verlag LNCS 829, 1994, pp. 33–40.

    Google Scholar 

  3. C. Blundo, P. D’Arco, V. Daza, C. Padro, Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures, Proc. of the Information Security Conference (ISC 2001), LNCS 2200, 2001, pp. 1–17.

    Google Scholar 

  4. C. Blundo, P. D’Arco, C. Padro, A ramp model for distributed key distribution schemes WCC 2001, pp. 92–102.

    Google Scholar 

  5. E. F. Brickell, Some ideal secret sharing schemes, J. of Comb. Math. and Comb. Computing 9, 1989, pp. 105–113.

    MathSciNet  Google Scholar 

  6. B. Chor, S. Goldwasser, S. Micali, B. Awerbuch, Verifiable secret sharing and achieving simultaneity in the presence of faults, Proc. of the IEEE 26th Annual Symp. on Foundations of Computer Science 1985, pp. 383–395.

    Google Scholar 

  7. R. Cramer, Introduction to Secure Computation. In Lectures on Data Security-Modern Cryptology in Theory and Practice, LNCS 1561, 1999, pp. 16–62.

    Google Scholar 

  8. P. D’Arco, On the Distribution of a Key Distribution Center, Proc. of ICTCS 2001, LNCS 2202, 2001, pp. 357–369.

    Google Scholar 

  9. V. Daza, J. Herranz, C. Padro, G. Saez, A distributed and computationally secure key distribution scheme, Cryptology ePrint Archive, Report 2002/069.

    Google Scholar 

  10. P. D’Arco, D. Stinson, On Unconditionally Secure Proactive Secret Sharing Scheme and Distributed Key Distribution Centers, unpublished manuscript, May 2002.

    Google Scholar 

  11. P. D’Arco, D. Stinson, On Unconditionally Secure Robust Distributed Key Distribution Centers, to appear in ASIACRYPT 2002.

    Google Scholar 

  12. M. van Dijk, ALinear Construction of Secret Sharing Schemes, DCC 12, 1997, pp. 161–201.

    MATH  Google Scholar 

  13. S. Fehr, U. Maurer, Linear VSS and Distributed Commitments Based on Secret Sharing and Pirwise Checks, Proc. CRYPTO 2002, Springer Verlag LNCS 2442, pp. 565–580.

    Google Scholar 

  14. R. Gennaro, Y. Ishai, E. Kushlevitz, T. Rabin, The round complexity of Verifiable Secret Sharing and Secure Multicasting, Proc. STOC 2001.

    Google Scholar 

  15. A. Herzberg, S. Jarecki, H. Krawczyk, M. Yung, Proactive secret sharing or: How to cope with perpetual leakage, Proc. CRYPTO 1995, Springer Verlag LNCS 963, pp. 339–352.

    Google Scholar 

  16. M. Hirt, U. Maurer, Player Simulation and General Adversary Structures in Perfect Multiparty Computation, J. of Cryptology 13, 2000, pp. 31–60.

    Article  MATH  MathSciNet  Google Scholar 

  17. M. Karchmer, A. Wigderson, On Span Programs, Proc. of 8-th Annual Structure in Complexity Theory Conference, San Diego, California, 18–21 May 1993. IEEE Computer Society Press, pp. 102–111.

    Google Scholar 

  18. M. Naor, B. Pinkas and O. Reingold, Distributed Pseudo-random Functions and KDCs, EuroCrypt’99, LNCS 1592, 1999, pp. 327–346.

    Google Scholar 

  19. V. Nikov, S. Nikova, B. Preneel, J. Vandewalle, Applying General Access Structure to Proactive Secret Sharing Schemes, Proc. of the 23rd Symposium on Information Theory in the Benelux, May 29–31, 2002, Universite Catolique de Lovain (UCL), Lovain-la-Neuve, Belgium, pp. 197–206, Cryptology ePrint Archive: Report 2002/141.

    Google Scholar 

  20. R. Ostrovsky, M. Yung, How to withstand mobile virus attack, ACM Symposium on principles of distributed computing, 1991, pp. 51–59. 423, 428

    Google Scholar 

  21. T. Rabin, M. Ben-Or, Verifiable secret sharing and multiparty protocols with honest majority, Proc. of the 21st Annual ACM Symp. on Theory of Computing 1989, pp. 73–85.

    Google Scholar 

  22. D. R. Stinson, R. Wei, Unconditionally Secure Proactive Secret Sharing Scheme with combinatorial Structures, SAC’99, Springer Verlag LNCS 1758, pp. 200–214.

    Google Scholar 

  23. A. Shamir, How to share a secret, Communications of the ACM 22, 1979, pp. 612–613.

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nikov, V., Nikova, S., Preneel, B., Vandewalle, J. (2002). On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure. In: Menezes, A., Sarkar, P. (eds) Progress in Cryptology — INDOCRYPT 2002. INDOCRYPT 2002. Lecture Notes in Computer Science, vol 2551. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36231-2_33

Download citation

  • DOI: https://doi.org/10.1007/3-540-36231-2_33

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00263-5

  • Online ISBN: 978-3-540-36231-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics