Abstract
Notwithstanding several advantages over deterministic schemes, probabilistic schemes like RPS and HARPS suffer from the fact that the computational overhead for public functions is proportional to the achievable collusion resistance \(n\). In this chapter, 3 scalable extensions of non-scalable schemes are discussed. For all such schemes the public function complexity is also small, and does not depend on the achievable collusion resistance \(n\). This chapter also proposes an \((n \phi, \alpha)\)-security model (in addition to the \((n,p)\)-model for probabilistic KPSs) to study the effect of an attacker’s ability to perform brute-force searches.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsAuthor information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Ramkumar, M. (2014). Scalable Extensions of Nonscalable Schemes. In: Symmetric Cryptographic Protocols. Springer, Cham. https://doi.org/10.1007/978-3-319-07584-6_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-07584-6_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07583-9
Online ISBN: 978-3-319-07584-6
eBook Packages: EngineeringEngineering (R0)