Cheating Detectable Secret Sharing Schemes for Random Bit Strings

被引:4
作者
Ogata, Wakaha [1 ]
Araki, Toshinori [1 ,2 ,3 ]
机构
[1] Tokyo Inst Technol, Tokyo 1528552, Japan
[2] NEC Corp Ltd, Internet Syst Res Labs, Kawasaki, Kanagawa 2118666, Japan
[3] NEC Corp Ltd, Common Platform Software Res Labs, Kawasaki, Kanagawa 2118666, Japan
关键词
secret sharing; cheating detection; SECURE; CHEATERS;
D O I
10.1587/transfun.E96.A.2230
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In secret sharing scheme, Tompa and Woll considered a problem of cheaters who try to make another participant reconstruct an invalid secret. Later, some models of such cheating were formalized and lower bounds of the size of shares were shown in the situation of fixing the minimum successful cheating probability. Under the assumption that cheaters do not know the distributed secret, no efficient scheme is known which can distribute bit strings. In this paper, we propose an efficient scheme for distributing bit strings with an arbitrary access structure. When distributing a random bit string with threshold access structures, the bit length of shares in the proposed scheme is only a few bits longer than the lower bound.
引用
收藏
页码:2230 / 2234
页数:5
相关论文
共 50 条
  • [21] Almost Optimal Cheating-Detectable (2, 2, n) Ramp Secret Sharing Scheme
    Agematsu, Tomoki
    Obana, Satoshi
    2019 SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR 2019), 2019, : 1 - 9
  • [22] Strictly cheating immune secret sharing
    Zhang, J
    Wen, QY
    ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 514 - 519
  • [23] On secret sharing schemes
    Blundo, C
    De Santis, A
    Vaccaro, U
    INFORMATION PROCESSING LETTERS, 1998, 65 (01) : 25 - 32
  • [24] On secret reconstruction in secret sharing schemes
    Wang, Huaxiong
    Wong, Duncan S.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (01) : 473 - 480
  • [25] Visual secret sharing with cheating prevention revisited
    Chen, Yu-Chi
    Tsai, Du-Shiau
    Horng, Gwoboa
    DIGITAL SIGNAL PROCESSING, 2013, 23 (05) : 1496 - 1504
  • [26] A Scheme of Rational Secret Sharing Against Cheating
    Cai Yong-quan
    Shi Hui-li
    INTERNATIONAL CONFERENCE OF CHINA COMMUNICATION (ICCC2010), 2010, : 60 - 64
  • [27] Almost Optimum Secret Sharing with Cheating Detection
    Jhanwar, Mahabir Prasad
    Safavi-Naini, Reihaneh
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING (SPACE 2015), 2015, 9354 : 359 - 372
  • [28] A Scheme of Rational Secret Sharing against Cheating
    Cai, Yongquan
    Shi, Huili
    PROCEEDINGS OF INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2009), 2009, : 166 - 169
  • [29] On identification secret sharing schemes
    Cai, N
    Lam, KY
    INFORMATION AND COMPUTATION, 2003, 184 (02) : 298 - 310
  • [30] Partial Secret Sharing Schemes
    Jafari, Amir
    Khazaei, Shahram
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (08) : 5364 - 5385