z-logo
open-access-imgOpen Access
Secured hierarchical secret sharing using ECC based signcryption
Author(s) -
Basu Atanu,
Sengupta Indranil,
Sing Jamuna Kanta
Publication year - 2012
Publication title -
security and communication networks
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.446
H-Index - 43
eISSN - 1939-0122
pISSN - 1939-0114
DOI - 10.1002/sec.370
Subject(s) - computer science , secret sharing , signcryption , scheme (mathematics) , verifiable secret sharing , computer security , overhead (engineering) , key (lock) , shared secret , computer network , adversary , hierarchy , key management , key distribution , public key cryptography , cryptography , encryption , mathematics , mathematical analysis , set (abstract data type) , economics , market economy , programming language , operating system
Most of the existing hierarchical secret‐sharing schemes are unconditionally (non‐cryptographically) secured, and they cannot survive from various types of attacks especially when the participants use resource‐constrained wireless mobile devices. In our proposed secured hierarchical secret‐sharing scheme, the participants are partitioned into different levels according to their ranks in any organization. In this hierarchy‐based secret‐sharing scheme, the trusted dealer distributes the delegated secret keys as shares to the participants through our proposed signcryption scheme that reduces computational cost and communication overhead. Again, the participants submit the signcrypted shares to the trusted dealer for reconstruction of the secret key. The proposed scheme distinguishes each level of hierarchy qualitatively, and any type of active or passive adversary or colluding participants cannot reconstruct the secret key. The novelty of our scheme is that it is conditionally (cryptographically) as well as unconditionally secured, and the participants may use resource‐constrained wireless mobile devices. The access structure chosen for our scheme increases the resilience of our scheme. Our proposed scheme is perfect and ideal. Copyright © 2011 John Wiley & Sons, Ltd.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here