Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities

Abstract With the wide usage of the information and communication technology (ICT) in smart cities, people’s lives become easier and more convenient. Cloud computing, as a burgeoning technology of the ICT, provides consumers with unlimited computing capabilities and storage resources. Using the cloud to promote the progress of the ICT-based applications meets the requirement of the practical usage, and is also in line with the sustainable development. As we all know, the secret sharing is a hot topic in the security community. Many security-assurance applications can be realized with the assistance of secret sharing. In this paper, an efficient cloud-aided verifiable secret sharing scheme is proposed based on the polynomial commitment for smart cities, which can be used in a variety of practical applications such as electronic voting and revocable electronic cash. In the proposed scheme, users can verify the received shares from the cloud. Moreover, in order to meet the requirement of the real-world usage, we extend our scheme to support the batch verification with the aid of a third-party arbitration center. In addition, the aggregate signature is used to verify whether a subset of users possess the shares that indeed sent by the cloud. The security analysis shows that the proposed scheme can satisfy the security requirements of the verifiable secret sharing (VSS) and the performance analysis shows that our scheme is more efficient than previous schemes in terms of the communication and the computation.

[1]  Wanlei Zhou,et al.  Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies , 2017, IEEE Communications Surveys & Tutorials.

[2]  Jun Zhang,et al.  Detecting and Preventing Cyber Insider Threats: A Survey , 2018, IEEE Communications Surveys & Tutorials.

[3]  Jianfeng Ma,et al.  New Publicly Verifiable Databases with Efficient Updates , 2015, IEEE Transactions on Dependable and Secure Computing.

[4]  Berry Schoenmakers,et al.  A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic , 1999, CRYPTO.

[5]  Rong Hao,et al.  A Cellular Automata Based Verifiable Multi-secret Sharing Scheme Without a Trusted Dealer , 2017 .

[6]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[7]  Lei Zhang,et al.  A new certificateless aggregate signature scheme , 2009, Comput. Commun..

[8]  Jun Zhang,et al.  Network Traffic Classification Using Correlation Information , 2013, IEEE Transactions on Parallel and Distributed Systems.

[9]  Zhihui Li,et al.  A verifiable secret sharing scheme without dealer in vector space , 2011, 2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD).

[10]  Jian Shen,et al.  A secure cloud-assisted urban data sharing framework for ubiquitous-cities , 2017, Pervasive Mob. Comput..

[11]  Tatsuaki Okamoto,et al.  A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications , 1998, EUROCRYPT.

[12]  Elisa Bertino,et al.  Robust Multi-Factor Authentication for Fragile Communications , 2014, IEEE Transactions on Dependable and Secure Computing.

[13]  Xinyi Huang,et al.  Certificate-based encryption resilient to key leakage , 2016, J. Syst. Softw..

[14]  Xiaofeng Chen,et al.  Secure Distributed Deduplication Systems with Improved Reliability , 2015, IEEE Trans. Computers.

[15]  Jin Li,et al.  Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..

[16]  Mohammad Sayad Haghighi,et al.  Dynamic and verifiable multi-secret sharing scheme based on Hermite interpolation and bilinear maps , 2015, IET Inf. Secur..

[17]  Kun Peng Critical survey of existing publicly verifiable secret sharing schemes , 2012, IET Inf. Secur..

[18]  J. Li,et al.  Smart city and the applications , 2011, 2011 International Conference on Electronics, Communications and Control (ICECC).

[19]  Jian Shen,et al.  Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing , 2019, IEEE Transactions on Dependable and Secure Computing.

[20]  Jianfeng Ma,et al.  Fair (t, n) threshold secret sharing scheme , 2013, IET Inf. Secur..

[21]  Jian Shen,et al.  Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing , 2020, IEEE Transactions on Emerging Topics in Computing.

[22]  Jian Shen,et al.  Anonymous and Traceable Group Data Sharing in Cloud Computing , 2018, IEEE Transactions on Information Forensics and Security.

[23]  Chitra Balakrishna,et al.  Enabling Technologies for Smart City Services and Applications , 2012, 2012 Sixth International Conference on Next Generation Mobile Applications, Services and Technologies.

[24]  Taraneh Eghlidos,et al.  An Efficient Lattice Based Multi-Stage Secret Sharing Scheme , 2017, IEEE Transactions on Dependable and Secure Computing.

[25]  Lieven De Marez,et al.  Smart Ideas for Smart Cities: Investigating Crowdsourcing for Generating and Selecting Ideas for ICT Innovation in a City Context , 2012, J. Theor. Appl. Electron. Commer. Res..

[26]  Jian Shen,et al.  An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.

[27]  Yuh-Min Tseng,et al.  Publicly verifiable multi-secret sharing scheme from bilinear pairings , 2013, IET Inf. Secur..

[28]  Qian Wang,et al.  Searchable Encryption over Feature-Rich Data , 2018, IEEE Transactions on Dependable and Secure Computing.

[29]  Michael Batty,et al.  Big data, smart cities and city planning , 2013, Dialogues in human geography.

[30]  Xiaodong Liu,et al.  A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment , 2016, Secur. Commun. Networks.

[31]  Zahir Tari,et al.  Security and Privacy in Cloud Computing: Vision, Trends, and Challenges , 2015, IEEE Cloud Computing.

[32]  Lei Wang,et al.  One Publicly Verifiable Secret Sharing Scheme based on linear code , 2010, 2010 The 2nd Conference on Environmental Science and Information Application Technology.

[33]  Anna Corinna Cagliano,et al.  Current trends in Smart City initiatives: some stylised facts , 2014 .

[34]  Muhammad Aamir Nadeem Cloud Computing: Security Issues and Challenges , 2016 .

[35]  Narendra Shekokar,et al.  Cloud computing security in multi-clouds using Shamir's secret sharing scheme , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).

[36]  Paul Feldman,et al.  A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).

[37]  Ching-Nung Yang,et al.  Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing , 2013, 2013 International Symposium on Biometrics and Security Technologies.

[38]  Ian Goldberg,et al.  Constant-Size Commitments to Polynomials and Their Applications , 2010, ASIACRYPT.