Optimum secret sharing scheme secure against cheating

被引:53
作者
Ogata, W
Kurosawa, K
Stinson, DR
机构
[1] Tokyo Inst Technol, Grad Sch Innovat Management, Meguro Ku, Tokyo 1528552, Japan
[2] Ibaraki Univ, Dept Comp & Informat Sci, Ibaraki 3168511, Japan
[3] Univ Waterloo, Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
关键词
cryptography; secret sharing schemes; cheaters; balanced incomplete block design; difference sets;
D O I
10.1137/S0895480100378689
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Tompa and Woll introduced a problem of cheating in (k, n) threshold secret sharing schemes. In this problem k - 1 malicious participants aim to cheat an honest one by opening forged shares and causing the honest participant to reconstruct the wrong secret. We first derive a tight lower bound on the size of shares \V-i\ for secret sharing schemes that protect against this type of attack: \V-i\ >= (\S\ - 1)/delta + 1, where V-i denotes the set of shares of participant P-i, S denotes the set of secrets, and delta denotes the cheating probability. We next present an optimum scheme, which meets the equality of our bound, by using "difference sets." A partial converse and some extensions are also shown.
引用
收藏
页码:79 / 95
页数:17
相关论文
共 50 条
  • [41] THE BREADTH OF SHAMIR SECRET-SHARING SCHEME
    DAWSON, E
    DONOVAN, D
    COMPUTERS & SECURITY, 1994, 13 (01) : 69 - 78
  • [42] A novel threshold changeable secret sharing scheme
    Harn, Lein
    Hsu, Chingfang
    Xia, Zhe
    FRONTIERS OF COMPUTER SCIENCE, 2022, 16 (01)
  • [43] A Secret Sharing Scheme with the Changeable Threshold Value
    Shi, Runhua
    Zhong, Hong
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 233 - 236
  • [44] Providing Anonymity in Unconditionally Secure Secret Sharing Schemes
    Mida Guillermo
    Keith M. Martin
    Christine M. O'Keefe
    Designs, Codes and Cryptography, 2003, 28 : 227 - 245
  • [45] Multi-factor cheating prevention in visual secret sharing by hybrid codebooks
    Lin, Chih-Hung
    Chen, Tzung-Her
    Wu, Yan-Ting
    Tsao, Kai-Hsiang
    Lin, Kai-Siang
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (07) : 1543 - 1557
  • [46] A secret sharing scheme based on cellular automata
    del Rey, AM
    Mateus, JP
    Sánchez, GR
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (02) : 1356 - 1364
  • [47] Adaptive and Optimum Secret Key Establishment for Secure Vehicular Communications
    Bottarelli, Mirko
    Karadimas, Petros
    Epiphaniou, Gregory
    Ismail, Dhouha Kbaier Ben
    Maple, Carsten
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (03) : 2310 - 2321
  • [48] Key Sharing Scheme based on One Weighted Threshold Secret Sharing
    Yoo, SeongMin
    Park, PyungKoo
    Shin, JinSeop
    Ryou, JaeCheo
    2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 317 - 320
  • [49] A New (t, n)-Threshold Secret Sharing Scheme
    Tang, Chunming
    Yao, Zheng-an
    2008 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING, 2008, : 920 - +
  • [50] A Modified Shamir Secret Sharing Scheme With Efficient Encoding
    Hineman, Allyson
    Blaum, Mario
    IEEE COMMUNICATIONS LETTERS, 2022, 26 (04) : 758 - 762