A Verifiable Multi-Secret Sharing Scheme Based on Short Integer Solution

被引:0
|
作者
LI Fulin [1 ,2 ]
YAN Jiayun [1 ]
ZHU Shixin [1 ,2 ]
HU Hang [1 ]
机构
[1] School of Mathematics, Hefei University of Technology
[2] Intelligent Interconnected Systems Laboratory of Anhui Province
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
With the possible birth of the quantum computer, traditional secret sharing schemes have been unable to meet security requirements. We proposed a new verifiable multi-secret sharing scheme based on the short integer solution problem. By utilizing a symmetric binary polynomial,k secrets and secret shares can be generated,and then we convert the secret shares into binary string on Zq, which can be identified by one-way anti-collision hash function on the lattice, so that multiple secrets can be reconstructed safely. The advantages mainly focus on verifiability without interaction in the distribution phase and less memory requirement. In a secret sharing scheme,verifiability prevents the dealer to share the wrong shares and forces the participants to submit their shares correctly. Meanwhile, the interaction can be reduced, which means the security is improved. In a multi-secret sharing scheme, releasing the public values is inevitable, this paper has less public values and less size of shares per secret size to reduce the pressure of memory consumption in the proper parameters. In the end, it can also effectively resist the quantum attack.
引用
收藏
页码:556 / 563
页数:8
相关论文
共 50 条
  • [1] A Verifiable Multi-Secret Sharing Scheme Based on Short Integer Solution
    Li Fulin
    Yan Jiayun
    Zhu Shixin
    Hu Hang
    CHINESE JOURNAL OF ELECTRONICS, 2023, 32 (03) : 556 - 563
  • [2] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138
  • [3] Verifiable Rational Multi-secret Sharing Scheme
    Cai, Yongquan
    Luo, Zhanhai
    Yang, Yi
    INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 : 42 - 48
  • [4] A verifiable multi-secret sharing scheme (VMSS)
    Pang Liaojun
    Li Huixian
    Jiao Licheng
    Wang Yumin
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 749 - +
  • [5] On Novel Verifiable Multi-Secret Sharing Scheme
    Wang, Jian
    Liu, Yanheng
    Wang, Yanxi
    ADVANCED SCIENCE LETTERS, 2011, 4 (11-12) : 3709 - 3715
  • [6] A practical verifiable multi-secret sharing scheme
    Zhao, Jianjie
    Zhang, Jianzhong
    Zhao, Rong
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) : 138 - 141
  • [7] Verifiable threshold multi-secret sharing scheme
    Pang, Liao-Jun
    Li, Hui-Xian
    Li, Zhi-Jie
    Wang, Yu-Min
    Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2008, 40 (09): : 1462 - 1465
  • [8] A verifiable multi-secret sharing scheme based on cellular automata
    Eslami, Z.
    Ahmadabadi, J. Zarepour
    INFORMATION SCIENCES, 2010, 180 (15) : 2889 - 2894
  • [9] A Lightweight Public Verifiable Multi Secret Sharing Scheme Using Short Integer Solution
    Dehkordi, Massoud Hadian
    Ghasemi, Reza
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (03) : 1459 - 1469
  • [10] A Lightweight Public Verifiable Multi Secret Sharing Scheme Using Short Integer Solution
    Massoud Hadian Dehkordi
    Reza Ghasemi
    Wireless Personal Communications, 2016, 91 : 1459 - 1469