{"title":"Ad Hoc网络中阈值秘密共享方案的建模","authors":"Weifeng Chen, Hu'an Li","doi":"10.1109/NAS.2008.60","DOIUrl":null,"url":null,"abstract":"A threshold secret sharing scheme divides a secret key into multiple shares. The secret key can be constructed based on a certain number of shares, if the number is bigger than the threshold. Threshold secret sharing schemes increase the availability of service in ad hoc networks and avoid the single point of failure. Consequently, many security mechanisms have been proposed based on threshold secret sharing. However, research about how to choose an appropriate threshold is still missing. In this paper, we use fork/join queueing theories to develop a general model to evaluate the performance of a threshold secret sharing scheme in ad hoc networks. Specifically, we focus on the response time a requesting node needs to wait before it receives enough responded shares. Our proposed model allows one to numerically calculate the response time based on the threshold. It also provides a tool for people to choose an appropriate threshold when deploying a threshold secret sharing scheme in ad hoc networks.","PeriodicalId":153238,"journal":{"name":"2008 International Conference on Networking, Architecture, and Storage","volume":"71 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Modelling Threshold Secret Sharing Schemes in Ad Hoc Networks\",\"authors\":\"Weifeng Chen, Hu'an Li\",\"doi\":\"10.1109/NAS.2008.60\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A threshold secret sharing scheme divides a secret key into multiple shares. The secret key can be constructed based on a certain number of shares, if the number is bigger than the threshold. Threshold secret sharing schemes increase the availability of service in ad hoc networks and avoid the single point of failure. Consequently, many security mechanisms have been proposed based on threshold secret sharing. However, research about how to choose an appropriate threshold is still missing. In this paper, we use fork/join queueing theories to develop a general model to evaluate the performance of a threshold secret sharing scheme in ad hoc networks. Specifically, we focus on the response time a requesting node needs to wait before it receives enough responded shares. Our proposed model allows one to numerically calculate the response time based on the threshold. It also provides a tool for people to choose an appropriate threshold when deploying a threshold secret sharing scheme in ad hoc networks.\",\"PeriodicalId\":153238,\"journal\":{\"name\":\"2008 International Conference on Networking, Architecture, and Storage\",\"volume\":\"71 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-06-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 International Conference on Networking, Architecture, and Storage\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NAS.2008.60\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Conference on Networking, Architecture, and Storage","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NAS.2008.60","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Modelling Threshold Secret Sharing Schemes in Ad Hoc Networks
A threshold secret sharing scheme divides a secret key into multiple shares. The secret key can be constructed based on a certain number of shares, if the number is bigger than the threshold. Threshold secret sharing schemes increase the availability of service in ad hoc networks and avoid the single point of failure. Consequently, many security mechanisms have been proposed based on threshold secret sharing. However, research about how to choose an appropriate threshold is still missing. In this paper, we use fork/join queueing theories to develop a general model to evaluate the performance of a threshold secret sharing scheme in ad hoc networks. Specifically, we focus on the response time a requesting node needs to wait before it receives enough responded shares. Our proposed model allows one to numerically calculate the response time based on the threshold. It also provides a tool for people to choose an appropriate threshold when deploying a threshold secret sharing scheme in ad hoc networks.