Optimum secret sharing scheme secure against cheating

被引:53
作者
Ogata, W
Kurosawa, K
Stinson, DR
机构
[1] Tokyo Inst Technol, Grad Sch Innovat Management, Meguro Ku, Tokyo 1528552, Japan
[2] Ibaraki Univ, Dept Comp & Informat Sci, Ibaraki 3168511, Japan
[3] Univ Waterloo, Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
关键词
cryptography; secret sharing schemes; cheaters; balanced incomplete block design; difference sets;
D O I
10.1137/S0895480100378689
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Tompa and Woll introduced a problem of cheating in (k, n) threshold secret sharing schemes. In this problem k - 1 malicious participants aim to cheat an honest one by opening forged shares and causing the honest participant to reconstruct the wrong secret. We first derive a tight lower bound on the size of shares \V-i\ for secret sharing schemes that protect against this type of attack: \V-i\ >= (\S\ - 1)/delta + 1, where V-i denotes the set of shares of participant P-i, S denotes the set of secrets, and delta denotes the cheating probability. We next present an optimum scheme, which meets the equality of our bound, by using "difference sets." A partial converse and some extensions are also shown.
引用
收藏
页码:79 / 95
页数:17
相关论文
共 50 条
  • [21] Secret Sharing Scheme with Fairness
    Tian, Youliang
    Ma, Jianfeng
    Peng, Changgen
    Zhu, Jianming
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 494 - 500
  • [22] Secret Sharing-Based IoT Text Data Outsourcing: A Secure and Efficient Scheme
    Tang, Zhaohui
    IEEE ACCESS, 2021, 9 : 76908 - 76920
  • [23] Properties and constraints of cheating-immune secret sharing schemes
    D'Arco, P
    Kishimoto, W
    Stinson, DR
    DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 219 - 233
  • [24] Cheating Detectable Secret Sharing Schemes for Random Bit Strings
    Ogata, Wakaha
    Araki, Toshinori
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (11) : 2230 - 2234
  • [25] AN EFFICIENT AND INFORMATION THEORETICALLY SECURE RATIONAL SECRET SHARING SCHEME BASED ON SYMMETRIC BIVARIATE POLYNOMIALS
    Tartary, Christophe
    Wang, Huaxiong
    Zhang, Yun
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2011, 22 (06) : 1395 - 1416
  • [26] Secure Visual Secret Sharing Scheme for Color Images Using Visual Cryptography and Digital Watermarking
    Saturwar, Jitendra
    Chaudhari, D. N.
    PROCEEDINGS OF THE 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES (ICECCT), 2017,
  • [27] Secret sharing scheme with inherited characteristic
    Ye Zhenjun1 & Meng Fanzhen2 1. The Dept. of Math and Physic
    2. The Science School of Tianjin Univ.
    JournalofSystemsEngineeringandElectronics, 2006, (04) : 916 - 918
  • [28] Strongly secure ramp secret sharing schemes for general access structures
    Iwamoto, M
    Yamamoto, H
    INFORMATION PROCESSING LETTERS, 2006, 97 (02) : 52 - 57
  • [29] Secret Verification Method Suitable for the Asymmetric Secret Sharing Scheme
    Imai, Takato
    Iwamura, Keiichi
    PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 1: DCNET, ICE-B, OPTICS, SIGMAP AND WINSYS (ICETE), 2019, : 172 - 179
  • [30] A secure visual secret sharing (VSS) scheme with CNN-based image enhancement for underwater images
    Mhala, Nikhil C.
    Pais, Alwyn R.
    VISUAL COMPUTER, 2021, 37 (08) : 2097 - 2111