On Novel Verifiable Multi-Secret Sharing Scheme

被引:0
|
作者
Wang, Jian [1 ,2 ]
Liu, Yanheng [1 ,2 ]
Wang, Yanxi [1 ,2 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun 130012, Peoples R China
[2] Jilin Univ, Key Lab Symbol Computat & Knowledge Engn, Minist Educ, Changchun 130012, Peoples R China
关键词
Multi-Secret Sharing; Shamir Secret Sharing; Time Complexity; Homogeneous Linear Recursion;
D O I
10.1166/asl.2011.1259
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In this paper, we analyze two improved YCH schemes and one multi-secret sharing scheme that is based on homogeneous linear recursion, and further based on Shamir secret sharing we propose a verifiable multi-secret sharing model, whose time complexity of secret reconstruction is O(k x t(2)) and is superior to the other two improved YCH models (O(t(3))(t > k)O(k(3))(t <= k), O(k x (n + k)(2))), and that the secret reconstruction time in simulations is even less than the other three models. We compare the advantages and disadvantages of the four models in the time complexity, the verifiability, the security, and the other aspects. When n > k, the required number of open values of the new model are fewer than the numbers of the other three models. The simulations show that the new model behaves better than the other three models in saving time to distribute and reconstruct secrets.
引用
收藏
页码:3709 / 3715
页数:7
相关论文
共 50 条
  • [31] Verifiable Threshold Scheme in Multi-Secret Sharing Distributions upon Extensions of ECC
    Wang, Shiuh-Jeng
    Tsai, Yuh-Ren
    Shen, Chien-Chih
    WIRELESS PERSONAL COMMUNICATIONS, 2011, 56 (01) : 173 - 182
  • [32] Verifiable multi-secret sharing based on LFSR sequences
    Hu, Chunqiang
    Liao, Xiaofeng
    Cheng, Xiuzhen
    THEORETICAL COMPUTER SCIENCE, 2012, 445 : 52 - 62
  • [33] A scheme for threshold multi-secret sharing
    Chan, CW
    Chang, CC
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) : 1 - 14
  • [34] A threshold multi-secret sharing scheme
    Shi Runhua
    Huang Liusheng
    Luo yonglong
    Zhong Hong
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1705 - +
  • [35] A non-interactive (t, n)-publicly verifiable multi-secret sharing scheme
    Samaneh Mashahdi
    Bagher Bagherpour
    Ali Zaghian
    Designs, Codes and Cryptography, 2022, 90 : 1761 - 1782
  • [36] Dynamic and verifiable multi-secret sharing scheme based on Hermite interpolation and bilinear maps
    Tadayon, Mohammad Hesam
    Khanmohammadi, Hadi
    Haghighi, Mohammad Sayad
    IET INFORMATION SECURITY, 2015, 9 (04) : 234 - 239
  • [37] A Cellular Automata Based Verifiable Multi-secret Sharing Scheme Without a Trusted Dealer
    Li Meng
    Yu Jia
    Hao Rong
    CHINESE JOURNAL OF ELECTRONICS, 2017, 26 (02) : 313 - 318
  • [38] A verifiable multi-secret image sharing scheme using XOR operation and hash function
    Chattopadhyay, Arup Kumar
    Nag, Amitava
    Singh, Jyoti Prakash
    Singh, Amit Kumar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (28-29) : 35051 - 35080
  • [39] A (k,t,n) verifiable multi-secret sharing scheme based on adversary structure
    Li, Jing
    Wang, Licheng
    Yan, Jianhua
    Niu, Xinxin
    Yang, Yixian
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (12): : 4552 - 4567
  • [40] A Cellular Automata Based Verifiable Multi-secret Sharing Scheme Without a Trusted Dealer
    LI Meng
    YU Jia
    HAO Rong
    ChineseJournalofElectronics, 2017, 26 (02) : 313 - 318