Asymmetric secret sharing scheme suitable for cloud systems

The asymmetric secret sharing scheme that we proposed at AINA2013 has a feature that reduces the required storage capacity of a specific server. This means that it can be used as the server not only for the entity of a cloud system but also for a device that is managed by a user, such as a smart phone. In this paper, first we propose a new method, which is an AINA method modified such that it is more suitable for application in a cloud system in which multiple users participate, and then, we propose an application to a life log, as an example of a specific application to which this method can be applied.

[1]  Gordon Bell,et al.  MyLifeBits: fulfilling the Memex vision , 2002, MULTIMEDIA '02.

[2]  Kaoru Kurosawa,et al.  Nonperfect Secret Sharing Schemes and Matroids , 1994, EUROCRYPT.

[3]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[4]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[5]  Satoshi Takahashi,et al.  Secret Sharing Scheme Suitable for Cloud Computing , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).

[6]  Vaibhav Kumar,et al.  Mobile Proactive Secret Sharing in Cloud Computing , 2012 .

[7]  Li Bai,et al.  A strong ramp secret sharing scheme using matrix projection , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[8]  Avi Wigderson,et al.  Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.

[9]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[10]  Keith M. Martin,et al.  A combinatorial interpretation of ramp schemes , 1996, Australas. J Comb..

[11]  Hugo Krawczyk,et al.  Secret Sharing Made Short , 1994, CRYPTO.

[12]  Kristin E. Lauter,et al.  Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.

[13]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[14]  Markus Stadler,et al.  Publicly Verifiable Secret Sharing , 1996, EUROCRYPT.

[15]  Catherine A. Meadows,et al.  Security of Ramp Schemes , 1985, CRYPTO.