Cheating Detectable Secret Sharing Schemes for Random Bit Strings

被引:4
作者
Ogata, Wakaha [1 ]
Araki, Toshinori [1 ,2 ,3 ]
机构
[1] Tokyo Inst Technol, Tokyo 1528552, Japan
[2] NEC Corp Ltd, Internet Syst Res Labs, Kawasaki, Kanagawa 2118666, Japan
[3] NEC Corp Ltd, Common Platform Software Res Labs, Kawasaki, Kanagawa 2118666, Japan
关键词
secret sharing; cheating detection; SECURE; CHEATERS;
D O I
10.1587/transfun.E96.A.2230
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In secret sharing scheme, Tompa and Woll considered a problem of cheaters who try to make another participant reconstruct an invalid secret. Later, some models of such cheating were formalized and lower bounds of the size of shares were shown in the situation of fixing the minimum successful cheating probability. Under the assumption that cheaters do not know the distributed secret, no efficient scheme is known which can distribute bit strings. In this paper, we propose an efficient scheme for distributing bit strings with an arbitrary access structure. When distributing a random bit string with threshold access structures, the bit length of shares in the proposed scheme is only a few bits longer than the lower bound.
引用
收藏
页码:2230 / 2234
页数:5
相关论文
共 50 条
  • [1] Almost Optimum Secret Sharing Schemes with Cheating Detection for Random Bit Strings
    Hoshino, Hidetaka
    Obana, Satoshi
    ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 213 - 222
  • [2] Leakage Resilient Cheating Detectable Secret Sharing Schemes
    Dutta, Sabyasachi
    Safavi-Naini, Reihaneh
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 3 - 23
  • [4] Cheating Detectable Secret Sharing Scheme Suitable for Implementation
    Hoshino, Hidetaka
    Obana, Satoshi
    2016 FOURTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2016, : 623 - 628
  • [5] A Coding Theorem for Cheating-Detectable (2,2)-Threshold Blockwise Secret Sharing Schemes
    Iwamoto, Mitsugu
    Yamamoto, Hirosuke
    Koga, Hiroki
    2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, : 1308 - +
  • [6] A Cheating-Detectable (k, L, n) Ramp Secret Sharing Scheme
    Nakamura, Wataru
    Yamamoto, Hirosuke
    Chan, Terence
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (12) : 2709 - 2719
  • [7] CHEATING DETECTION AND CHEATER IDENTIFICATION IN SECRET SHARING SCHEMES
    WU, TC
    WU, TS
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1995, 142 (05): : 367 - 369
  • [8] An efficient cheating-detectable secret image sharing scheme with smaller share sizes
    Liu, Zuquan
    Zhu, Guopu
    Zhang, Yu
    Zhang, Hongli
    Kwong, Sam
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 81
  • [9] Properties and constraints of cheating-immune secret sharing schemes
    D'Arco, P
    Kishimoto, W
    Stinson, DR
    DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 219 - 233
  • [10] Outsourced cheating detection for secret sharing
    Cianciullo, Louis
    Ghodosi, Hossein
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (06) : 871 - 878