A protocol of member-join in a secret sharing scheme

12Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A protocol of the member-join in a secret sharing scheme is proposed. The proposed protocol can ensure that the original group members' keys remain invariable after the fresh member joins in the group. It makes the key management convenience. The original members can't gain the share key of the new member, and the keys of the original members don't be leaked out when distributing the share key for the new member. In the key's distributing process, the behavior of the cheaters can be detected, and the new member himself can verify the validity of his share key. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Li, X., & He, M. (2006). A protocol of member-join in a secret sharing scheme. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3903 LNCS, pp. 134–141). Springer Verlag. https://doi.org/10.1007/11689522_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free