Decentralized CRT-Based Efficient Verifiable (n, t, n) Multi-secret Sharing Scheme

被引:0
作者
Wen, Wen [1 ]
Vaidya, Binod [1 ]
Makrakis, Dimitrios [1 ]
Adams, Carlisle [1 ]
机构
[1] Univ Ottawa, Sch Elect Engn & Comp Sci, Ottawa, ON, Canada
来源
FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014) | 2015年 / 8930卷
关键词
Security; (n; t; n) secret sharing; Multi-secret sharing; Verification; ONE-WAY FUNCTION;
D O I
10.1007/978-3-319-17040-4_18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret sharing is critical to most applications making use of security and remains one of the most challenging research areas in modern cryptography. In this paper, we propose a novel efficient multi-secret sharing scheme that is based on the (n, t, n) secret sharing technique. We use the Chinese remainder theorem (CRT) to generate secret shares and the reconstruction of secrets instead of using the Lagrange polynomial interpolation. In addition, we discuss the security of the scheme, and provide a new method to generate verifiable shares that make the proposed scheme a verifiable secret sharing scheme.
引用
收藏
页码:279 / 293
页数:15
相关论文
共 16 条
[1]  
[Anonymous], SIGOPS OPERATING SYS
[2]   A MODULAR APPROACH TO KEY SAFEGUARDING [J].
ASMUTH, C ;
BLOOM, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :208-210
[3]  
Blakley G. R., 1979, AFIPS Conference Proceedings, vol.48. 1979 National Computer Conference, P313, DOI 10.1109/MARK.1979.8817296
[4]   Comments on Harn-Lin's cheating detection scheme [J].
Ghodosi, Hossein .
DESIGNS CODES AND CRYPTOGRAPHY, 2011, 60 (01) :63-66
[5]   Strong (n,t,n) verifiable secret sharing scheme [J].
Harn, Lein ;
Lin, Changlu .
INFORMATION SCIENCES, 2010, 180 (16) :3059-3064
[6]   Detection and identification of cheaters in (t, n) secret sharing scheme [J].
Harn, Lein ;
Lin, Changlu .
DESIGNS CODES AND CRYPTOGRAPHY, 2009, 52 (01) :15-24
[7]   MULTISTAGE SECRET SHARING BASED ON ONE-WAY FUNCTION [J].
HE, J ;
DAWSON, E .
ELECTRONICS LETTERS, 1994, 30 (19) :1591-1592
[8]   MULTISECRET-SHARING SCHEME BASED ON ONE-WAY FUNCTION [J].
HE, J ;
DAWSON, E .
ELECTRONICS LETTERS, 1995, 31 (02) :93-95
[9]  
Herranz J., 2013, CODES CRYPTOGRAPHY, V73, P841
[10]  
Lin H, 2008, INT J CONT MATH SCI, V3, P37, DOI DOI 10.1109/ICACT.2007.358655