On the Construction and Analysis of Verifiable Multi-secret Sharing Based on Non-homogeneous Linear Recursion

被引:0
作者
Zhang, Ben-Hui [1 ]
Tang, Yuan-Sheng [2 ]
机构
[1] Huaibei Normal Univ, Sch Math Sci, Huaibei 235000, Peoples R China
[2] Yangzhou Univ, Sch Math Sci, Yangzhou 225002, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
secret sharing; non-homogeneous linear recursion; public value; computation complexity; running time; ELLIPTIC-CURVES; FAIR T; SCHEME; EFFICIENT;
D O I
10.6688/JISE.2018.34.3.11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We shall propose two verifiable multi-secret sharing schemes based on novel non homogeneous linear recursions. In the initial phase, the secret shadow of each participant is selected by himself. In the construction phase, the dealer puts the information of shared secrets in the initialization vector of non-homogeneous linear recursions of degree t - 1. In the verification phase, verification algorithms based on elliptic curve are designed to resist a variety of cheating actions or attacks. In the recovery phase, each participant just needs to provide secret share instead of secret shadow. The proposed schemes have the following features: verifiability, the reuse of secret shadows and shared secrets is possible, only public channels are needed. Compared with previous schemes, they have better performance, fewer public values, lower computation complexity, shorter key length and less running time.
引用
收藏
页码:749 / 763
页数:15
相关论文
共 20 条
[1]  
Biggs N. L., 1989, DISCRETE MATH
[2]  
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[3]  
Chen Yangkui, 2010, Acta Scientiarum Naturalium Universitatis Pekinensis, V46, P709
[4]  
Chien HY, 2000, IEICE T FUND ELECTR, VE83A, P2762
[5]   Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves [J].
Dehkordi, Massoud Hadian ;
Mashhadi, Samaneh .
COMPUTER COMMUNICATIONS, 2008, 31 (09) :1777-1784
[6]  
Dehkordi MH, 2008, INFORM SCIENCES, V178, P2262, DOI 10.1016/j.ins.2007.11.031
[7]   An efficient threshold verifiable multi-secret sharing [J].
Dehkordi, Massoud Hadian ;
Mashhadi, Samaneh .
COMPUTER STANDARDS & INTERFACES, 2008, 30 (03) :187-190
[8]   Fair secret reconstruction in (t, n) secret sharing [J].
Harn, Lein ;
Lin, Changlu ;
Li, Yong .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 23 :1-7
[9]   Comments on 'Fair (t, n) threshold secret sharing scheme' [J].
Harn, Lein .
IET INFORMATION SECURITY, 2014, 8 (06) :303-304
[10]   Secure secret reconstruction and multi-secret sharing schemes with unconditional security [J].
Harn, Lein .
SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (03) :567-573