Abstract
Secret sharing is a fundamental cryptographic task. Motivated by the virtual automata abstraction and swarm computing, we investigate an extension of the k-secret sharing scheme, in which the secret shares are changed on the fly, independently and without (internal) communication, as a reaction to a global external trigger. The changes are made while maintaining the requirement that k or more secret shares may reconstruct the secret and no k - 1 or fewer can do so. The application considered is a swarm of mobile processes, each maintaining a share of the secret which may change according to common outside inputs, e.g., inputs received by sensors attached to the process. The proposed schemes support addition and removal of processes from the swarm, as well as corruption of a small portion of the processes in the swarm.
| Original language | English |
|---|---|
| Pages (from-to) | 1291-1305 |
| Number of pages | 15 |
| Journal | Ad Hoc Networks |
| Volume | 10 |
| Issue number | 7 |
| DOIs | |
| State | Published - 1 Sep 2012 |
Keywords
- Mobile computing
- Secret sharing
- Secure multi-party computation
ASJC Scopus subject areas
- Software
- Hardware and Architecture
- Computer Networks and Communications
Fingerprint
Dive into the research topics of 'Secret swarm unit: Reactive k-secret sharing'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver