Optimum secret sharing scheme secure against cheating

被引:53
作者
Ogata, W
Kurosawa, K
Stinson, DR
机构
[1] Tokyo Inst Technol, Grad Sch Innovat Management, Meguro Ku, Tokyo 1528552, Japan
[2] Ibaraki Univ, Dept Comp & Informat Sci, Ibaraki 3168511, Japan
[3] Univ Waterloo, Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
关键词
cryptography; secret sharing schemes; cheaters; balanced incomplete block design; difference sets;
D O I
10.1137/S0895480100378689
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Tompa and Woll introduced a problem of cheating in (k, n) threshold secret sharing schemes. In this problem k - 1 malicious participants aim to cheat an honest one by opening forged shares and causing the honest participant to reconstruct the wrong secret. We first derive a tight lower bound on the size of shares \V-i\ for secret sharing schemes that protect against this type of attack: \V-i\ >= (\S\ - 1)/delta + 1, where V-i denotes the set of shares of participant P-i, S denotes the set of secrets, and delta denotes the cheating probability. We next present an optimum scheme, which meets the equality of our bound, by using "difference sets." A partial converse and some extensions are also shown.
引用
收藏
页码:79 / 95
页数:17
相关论文
共 50 条
  • [31] A Secure Reversible Data Hiding Scheme for Digital Images using Random Grid Visual Secret Sharing
    Kukreja, Sonal
    Kasana, Geeta
    PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, : 864 - 869
  • [32] A secure scheme to share secret color images
    Alvarez, G
    Encinas, AH
    Encinas, LH
    del Rey, AM
    COMPUTER PHYSICS COMMUNICATIONS, 2005, 173 (1-2) : 9 - 16
  • [33] Provably secure verifiable multi-stage secret sharing scheme based on monotone span program
    Mashhadi, Samaneh
    Dehkordi, Massoud Hadian
    Kiamari, Niloofar
    IET INFORMATION SECURITY, 2017, 11 (06) : 326 - 331
  • [34] Threshold Quantum Secret Sharing of Secure Direct Communication
    Li Bao-Kui
    Yang Yu-Guang
    Wen Qiao-Yan
    CHINESE PHYSICS LETTERS, 2009, 26 (01)
  • [35] Providing anonymity in unconditionally secure secret sharing schemes
    Guillermo, M
    Martin, KM
    O'Keefe, CM
    DESIGNS CODES AND CRYPTOGRAPHY, 2003, 28 (03) : 227 - 245
  • [36] A Secure Visual Secret Checking of Meaningful Sharing Images
    Chen, Chin-Ling
    Chen, Wen-Hu
    Chen, Chih-Cheng
    Lai, Yeong-Lin
    Tseng, Kuo-Kun
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (05): : 2327 - 2335
  • [37] A Novel Quantum Visual Secret Sharing Scheme
    Liu, Wenjie
    Xu, Yinsong
    Zhang, Maojun
    Chen, Junxiu
    Yang, Ching-Nung
    IEEE ACCESS, 2019, 7 : 114374 - 114384
  • [38] An Efficient Halftone Visual Secret Sharing Scheme
    Arya, K. V.
    Rishiwal, Vinay
    Yadav, Arun Kumar
    2014 9TH INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS (ICIIS), 2014, : 70 - 74
  • [39] Bayesian mechanism for rational secret sharing scheme
    Tian YouLiang
    Peng ChangGen
    Lin DongDai
    Ma JianFeng
    Jiang Qi
    Ji WenJiang
    SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (05) : 1 - 13
  • [40] Probabilistic Secret Sharing Scheme for Binary Images
    Mishra, Abhishek
    Gupta, Ashutosh
    2015 COMMUNICATION, CONTROL AND INTELLIGENT SYSTEMS (CCIS), 2015, : 143 - 146