TY - GEN
T1 - Secret Sharing on Evolving Multi-level Access Structure
AU - Dutta, Sabyasachi
AU - Roy, Partha Sarathi
AU - Fukushima, Kazuhide
AU - Kiyomoto, Shinsaku
AU - Sakurai, Kouichi
N1 - Funding Information:
S. Dutta—Research is financially supported by National Institute of Information and Communications Technology (NICT), Japan under the NICT International Invitation Program.
Publisher Copyright:
© 2020, Springer Nature Switzerland AG.
PY - 2020
Y1 - 2020
N2 - Secret sharing is a process that allows storing secret information in a distributed manner among several participants. In the original setting of secret sharing schemes, it was assumed that the total number of participants is fixed from the very beginning. However, to meet the state of the art needs, it is required to consider the scenario where any time a new participant can join and the total number of participants is (possibly) unbounded. Evolving secret sharing solves the problem. Secret sharing for evolving threshold access structure has been considered in the last few years. Here, we consider the Multi-level access structures. More specifically, we consider evolving compartmental and hierarchical access structures. We provide constructions with the estimation of share sizes.
AB - Secret sharing is a process that allows storing secret information in a distributed manner among several participants. In the original setting of secret sharing schemes, it was assumed that the total number of participants is fixed from the very beginning. However, to meet the state of the art needs, it is required to consider the scenario where any time a new participant can join and the total number of participants is (possibly) unbounded. Evolving secret sharing solves the problem. Secret sharing for evolving threshold access structure has been considered in the last few years. Here, we consider the Multi-level access structures. More specifically, we consider evolving compartmental and hierarchical access structures. We provide constructions with the estimation of share sizes.
UR - http://www.scopus.com/inward/record.url?scp=85079094773&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85079094773&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-39303-8_14
DO - 10.1007/978-3-030-39303-8_14
M3 - Conference contribution
AN - SCOPUS:85079094773
SN - 9783030393021
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 180
EP - 191
BT - Information Security Applications - 20th International Conference, WISA 2019, Revised Selected Papers
A2 - You, Ilsun
PB - Springer
T2 - 20th World Conference on Information Security Applications, WISA 2019
Y2 - 21 August 2019 through 24 August 2019
ER -