On Novel Verifiable Multi-Secret Sharing Scheme

被引:0
|
作者
Wang, Jian [1 ,2 ]
Liu, Yanheng [1 ,2 ]
Wang, Yanxi [1 ,2 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun 130012, Peoples R China
[2] Jilin Univ, Key Lab Symbol Computat & Knowledge Engn, Minist Educ, Changchun 130012, Peoples R China
关键词
Multi-Secret Sharing; Shamir Secret Sharing; Time Complexity; Homogeneous Linear Recursion;
D O I
10.1166/asl.2011.1259
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In this paper, we analyze two improved YCH schemes and one multi-secret sharing scheme that is based on homogeneous linear recursion, and further based on Shamir secret sharing we propose a verifiable multi-secret sharing model, whose time complexity of secret reconstruction is O(k x t(2)) and is superior to the other two improved YCH models (O(t(3))(t > k)O(k(3))(t <= k), O(k x (n + k)(2))), and that the secret reconstruction time in simulations is even less than the other three models. We compare the advantages and disadvantages of the four models in the time complexity, the verifiability, the security, and the other aspects. When n > k, the required number of open values of the new model are fewer than the numbers of the other three models. The simulations show that the new model behaves better than the other three models in saving time to distribute and reconstruct secrets.
引用
收藏
页码:3709 / 3715
页数:7
相关论文
共 50 条
  • [11] Verifiable multi-secret sharing scheme based on S-multiplication
    He, MX
    Fan, PZ
    Kaderali, F
    WAVELET ANALYSIS AND ITS APPLICATIONS, AND ACTIVE MEDIA TECHNOLOGY, VOLS 1 AND 2, 2004, : 602 - 608
  • [12] Publicly verifiable multi-secret sharing scheme from bilinear pairings
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    IET INFORMATION SECURITY, 2013, 7 (03) : 239 - 246
  • [13] Efficient verifiable multi-secret sharing scheme based on hash function
    Shao, Jun
    INFORMATION SCIENCES, 2014, 278 : 104 - 109
  • [14] A Verifiable Multi-Secret Sharing Scheme Based on Short Integer Solution
    Li Fulin
    Yan Jiayun
    Zhu Shixin
    Hu Hang
    CHINESE JOURNAL OF ELECTRONICS, 2023, 32 (03) : 556 - 563
  • [15] An Efficient Verifiable Threshold Multi-Secret Sharing Scheme With Different Stages
    Chen, Dong
    Lu, Wei
    Xing, Weiwei
    Wang, Na
    IEEE ACCESS, 2019, 7 : 107104 - 107110
  • [16] A verifiable multi-secret image sharing scheme based on DNA encryption
    Chattopadhyay A.K.
    Saha S.
    Nag A.
    Singh J.P.
    Multimedia Tools and Applications, 2025, 84 (4) : 1967 - 1983
  • [17] A New Verifiable Multi-secret Sharing Scheme Realizing Adversary Structure
    Dehkordi, Masoud Hadian
    Farzaneh, Yousof
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (03) : 1749 - 1758
  • [18] A Verifiable Multi-Secret Sharing Scheme Based on Short Integer Solution
    LI Fulin
    YAN Jiayun
    ZHU Shixin
    HU Hang
    ChineseJournalofElectronics, 2023, 32 (03) : 556 - 563
  • [19] A New Verifiable Multi-secret Sharing Scheme Realizing Adversary Structure
    Masoud Hadian Dehkordi
    Yousof Farzaneh
    Wireless Personal Communications, 2015, 82 : 1749 - 1758
  • [20] A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps
    Ziba Eslami
    Saideh Kabiri Rad
    Wireless Personal Communications, 2012, 63 : 459 - 467