On Novel Verifiable Multi-Secret Sharing Scheme

被引:0
|
作者
Wang, Jian [1 ,2 ]
Liu, Yanheng [1 ,2 ]
Wang, Yanxi [1 ,2 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun 130012, Peoples R China
[2] Jilin Univ, Key Lab Symbol Computat & Knowledge Engn, Minist Educ, Changchun 130012, Peoples R China
关键词
Multi-Secret Sharing; Shamir Secret Sharing; Time Complexity; Homogeneous Linear Recursion;
D O I
10.1166/asl.2011.1259
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In this paper, we analyze two improved YCH schemes and one multi-secret sharing scheme that is based on homogeneous linear recursion, and further based on Shamir secret sharing we propose a verifiable multi-secret sharing model, whose time complexity of secret reconstruction is O(k x t(2)) and is superior to the other two improved YCH models (O(t(3))(t > k)O(k(3))(t <= k), O(k x (n + k)(2))), and that the secret reconstruction time in simulations is even less than the other three models. We compare the advantages and disadvantages of the four models in the time complexity, the verifiability, the security, and the other aspects. When n > k, the required number of open values of the new model are fewer than the numbers of the other three models. The simulations show that the new model behaves better than the other three models in saving time to distribute and reconstruct secrets.
引用
收藏
页码:3709 / 3715
页数:7
相关论文
共 50 条
  • [21] A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps
    Eslami, Ziba
    Rad, Saideh Kabiri
    WIRELESS PERSONAL COMMUNICATIONS, 2012, 63 (02) : 459 - 467
  • [22] A (n, t, n) Verifiable Multi-secret Sharing Scheme with Secure Secret Reconstruction
    Meng, Li
    Qu Shaoyun
    Xun Tiantian
    Jia, Yu
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 191 - 204
  • [23] A Finite Equivalence of Verifiable Multi-secret Sharing
    Zhao, Hui
    Li, Mingchu
    Sakurai, Kouichi
    Ren, Yizhi
    Sun, Jonathan Z.
    Wang, Fengying
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2012, 5 (01) : 1 - 12
  • [24] A Finite Equivalence of Verifiable Multi-secret Sharing
    Hui Zhao
    Mingchu Li
    Kouichi Sakurai
    Yizhi Ren
    Jonathan Z. Sun
    Fengying Wang
    International Journal of Computational Intelligence Systems, 2012, 5 : 1 - 12
  • [25] An efficient threshold verifiable multi-secret sharing
    Dehkordi, Massoud Hadian
    Mashhadi, Samaneh
    COMPUTER STANDARDS & INTERFACES, 2008, 30 (03) : 187 - 190
  • [26] Verifiable Threshold Scheme in Multi-Secret Sharing Distributions upon Extensions of ECC
    Shiuh-Jeng Wang
    Yuh-Ren Tsai
    Chien-Chih Shen
    Wireless Personal Communications, 2011, 56 : 173 - 182
  • [27] Dynamic and verifiable threshold multi-secret sharing scheme based on bilinear pairings
    Li, Huina
    ICIC Express Letters, 2015, 9 (10): : 2819 - 2825
  • [28] A Verifiable Multi-Secret Sharing Scheme Based on ℓ-Intersection Pair of Cyclic Codes
    Hossain, Md Ajaharul
    Bandi, Ramakrishna
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2024, 35 (08) : 929 - 948
  • [29] A secure and efficient (t, n) threshold verifiable multi-secret sharing scheme
    Huang, MJ
    Zhang, JZ
    Xie, SC
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 532 - 537
  • [30] A NEW VERIFIABLE MULTI-SECRET SHARING SCHEME BASED ON ELLIPTIC CURVES AND PAIRINGS
    Bahramian, Mojtaba
    Eslami, Khadijeh
    ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2019, (41): : 456 - 468