Security of Data` in Cloud Computing Based on Advanced Secret Sharing Key Management Scheme

2020 ◽  
Author(s):  
Shipra Yadav ◽  
Keshao D. Kalaskar ◽  
Pankaj Dhumane
2011 ◽  
Vol 1 ◽  
pp. 295-299
Author(s):  
Jun Wu ◽  
Run Hua Shi ◽  
Hong Zhong

This paper proposes a hierarchical key management scheme in the mobile Ad hoc networks. In this scheme, there are two kinds of server nodes: the special server nodes and the ordinary server nodes, such that only when two kinds of server nodes collaborate can they provide a certificate service. In order to satisfy this special application, we design a new secret sharing scheme for splitting the system private key, in which it generates two different kinds of shares of the system private key: the special share and the ordinary share, where it needs at least one special share and t ordinary shares to recover the system private key, thus we call it threshold scheme. Furthermore, we present a distributed signature scheme for a user’s certificate in the mobile Ad hoc networks based on this secret sharing.


Author(s):  
Junghoon Kim ◽  
Hoonjung Lee ◽  
Junggab Son ◽  
Wonwoo Rhim ◽  
Sangjin Kim ◽  
...  

2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Tianqi Zhou ◽  
Jian Shen ◽  
Yongjun Ren ◽  
Sai Ji

Intelligent transportation systems (ITS) have always been an important application of Internet of Things (IoT). Today, big data and cloud computing have further promoted the construction and development of ITS. At the same time, the development of blockchain has also brought new features and convenience to ITS. However, due to the endless emergence of increasingly advanced types of attacks, the security of blockchain-based ITS needs more attention from industry and academia. In this paper, we focus on exploring the primitives in cryptography to guarantee the security of blockchain-based ITS. In particular, the authentication, encryption, and key management schemes in cryptography are discussed. Furthermore, we propose two methods for achieving the threshold key management in blockchain-based ITS. The proposed threshold key management scheme (with threshold t ) enables various stakeholders to recover a secret if the number of participated stakeholders is at least t . It should be noted that the proposed threshold key management scheme is efficient and secure for multiple users in blockchain-based ITS, especially for the data-sharing scenario.


Sign in / Sign up

Export Citation Format

Share Document