Affiliation:
1. Indian Statistical Institute, Kolkata 700108, West Bengal, India
Abstract
Secret sharing schemes are widely used to protect data by breaking the secret into pieces and sharing them amongst various members of a party. In this paper, our objective is to produce a repairable ramp scheme that allows for the retrieval of a share through a collection of members in the event of its loss. Repairable Threshold Schemes (RTSs) can be used in cloud storage and General Data Protection Regulation (GDPR) protocols. Secure and energy-efficient data transfer in sensor-based IoTs is built using ramp-type schemes. Protecting personal privacy and reinforcing the security of electronic identification (eID) cards can be achieved using similar schemes. Desmedt et al. introduced the concept of frameproofness in 2021, which motivated us to further improve our construction with respect to this framework. We introduce a graph theoretic approach to the design for a well-rounded and easy presentation of the idea and clarity of our results. We also highlight the importance of secret sharing schemes for IoT applications, as they distribute the secret amongst several devices. Secret sharing schemes offer superior security in lightweight IoT compared to symmetric key encryption or AE schemes because they do not disclose the entire secret to a single device, but rather distribute it among several devices.
Subject
Electrical and Electronic Engineering,Engineering (miscellaneous),Computer Science (miscellaneous)
Reference15 articles.
1. Čuřík, P., Ploszek, R., and Zajac, P. (2022). Practical Use of Secret Sharing for Enhancing Privacy in Clouds. Electronics, 11.
2. A Secret Sharing-Based Scheme for Secure and Energy Efficient Data Transfer in Sensor-Based IoT;Shivhare;J. Supercomput.,2022
3. Secret sharing-based IoT text data outsourcing: A secure and efficient scheme;Tang;IEEE Access,2021
4. Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment;Park;Pers. Ubiquitous Comput.,2018
5. A comparative study of the secret sharing algorithms for secure data in the cloud;Nirmala;Int. J. Cloud Comput. Serv. Archit. (IJCCSA),2012
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献