Leakage-resilient verifiable multi-secret sharing scheme

被引:0
|
作者
Shen H. [1 ]
Chen M.-W. [1 ]
Zhang M.-W. [1 ]
机构
[1] School of Computer Science, Hubei University of Technology, Wuhan
来源
Beijing Youdian Daxue Xuebao | / 1卷 / 87-91期
关键词
Leakage-resilient; Multi-secret sharing; Verifiability;
D O I
10.13190/j.jbupt.2016.01.016
中图分类号
学科分类号
摘要
In the existing multi-secret sharing schemes mainly depending ondealer selections, the polynomial coefficients constructs the polynomial and takes the value of polynomial function as shadows of secrets, however, the semi-honest dealer may leak information of secrets by changing the polynomial coefficients. In order to solve the problem by semi-honest dealer, the article presented a new leakage-resilient verifiable multi-secret sharing scheme The problem of leakage secret information hiddens in that the polynomial coefficients are selected and constructed by all of participants. Comparison with existing schemes which also achieve verifiable multi-secret sharing, the scheme can still work well even when the dealer leaks some secret information. It has better efficiency in terms of computation overhead. © 2016, Beijing University of Posts and Telecommunications. All right reserved.
引用
收藏
页码:87 / 91
页数:4
相关论文
共 7 条
  • [1] Wang F., Gu L., Zheng S., Et al., A verfiable multi-policy secret sharing scheme, Journal of Beijing University of Posts and Telecommunications, 33, 6, pp. 72-75, (2010)
  • [2] Shamir A., How to share a secret, Communications of the ACM, 22, 11, pp. 612-613, (1979)
  • [3] Blakley G.R., Safeguarding cryptographic keys, Proceedings of the National Computer Conference, pp. 313-317, (1979)
  • [4] Chang T., Hwang M., Yang W., An improvement on the Lin-Wu(t, n) threshold verifiable multi-secret sharing scheme, Applied Mathematics and Computation, 163, 1, pp. 169-178, (2005)
  • [5] Eslami Z., Ahmadabadi J.Z., A verifiable multi-secret sharing scheme based on cellular automata, Information Sciences, 180, 15, pp. 2889-2894, (2010)
  • [6] Olimid R.F., Dealer-leakage resilient verifiable secret sharing, (2014)
  • [7] Jun S., Efficient verifiable multi-secret sharing scheme based on Hash function, Information Sciences, 278, 9, pp. 104-109, (2014)