Cheating Detectable Secret Sharing Schemes for Random Bit Strings

被引:4
作者
Ogata, Wakaha [1 ]
Araki, Toshinori [1 ,2 ,3 ]
机构
[1] Tokyo Inst Technol, Tokyo 1528552, Japan
[2] NEC Corp Ltd, Internet Syst Res Labs, Kawasaki, Kanagawa 2118666, Japan
[3] NEC Corp Ltd, Common Platform Software Res Labs, Kawasaki, Kanagawa 2118666, Japan
关键词
secret sharing; cheating detection; SECURE; CHEATERS;
D O I
10.1587/transfun.E96.A.2230
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In secret sharing scheme, Tompa and Woll considered a problem of cheaters who try to make another participant reconstruct an invalid secret. Later, some models of such cheating were formalized and lower bounds of the size of shares were shown in the situation of fixing the minimum successful cheating probability. Under the assumption that cheaters do not know the distributed secret, no efficient scheme is known which can distribute bit strings. In this paper, we propose an efficient scheme for distributing bit strings with an arbitrary access structure. When distributing a random bit string with threshold access structures, the bit length of shares in the proposed scheme is only a few bits longer than the lower bound.
引用
收藏
页码:2230 / 2234
页数:5
相关论文
共 50 条
  • [31] (k,n) secret image sharing scheme capable of cheating detection
    Yan-Xiao Liu
    Qin-Dong Sun
    Ching-Nung Yang
    EURASIP Journal on Wireless Communications and Networking, 2018
  • [32] (k, n) secret image sharing scheme capable of cheating detection
    Liu, Yan-Xiao
    Sun, Qin-Dong
    Yang, Ching-Nung
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
  • [33] Cheating identifiable secret sharing scheme using symmetric bivariate polynomial
    Liu, Yanxiao
    Yang, Chingnung
    Wang, Yichuan
    Zhu, Lei
    Ji, Wenjiang
    INFORMATION SCIENCES, 2018, 453 : 21 - 29
  • [34] Cheating detection and cheater identification in (t, n) secret sharing scheme
    Wang, Zhixiao
    Liu, Yanxiao
    Yan, Wenyao
    Wei, Wei
    Li, Junhuai
    Zhang, Deyun
    Alfandi, Omar
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2014, 29 (01): : 87 - 93
  • [35] Optimum secret sharing scheme secure against cheating
    Ogata, W
    Kurosawa, K
    Stinson, DR
    SIAM JOURNAL ON DISCRETE MATHEMATICS, 2006, 20 (01) : 79 - 95
  • [36] Verifiable Secret Redistribution for Proactive Secret Sharing Schemes
    于佳
    孔凡玉
    李大兴
    Journal of Shanghai Jiaotong University(Science), 2006, (02) : 236 - 241
  • [37] Security of Selected Secret Sharing Schemes
    Ogiela, Urszula
    Takizawa, Makoto
    Ogiela, Lidia
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2017, 2018, 612 : 395 - 400
  • [38] Weighted threshold secret sharing schemes
    Morillo, P
    Padró, C
    Sáez, G
    Villar, JL
    INFORMATION PROCESSING LETTERS, 1999, 70 (05) : 211 - 216
  • [39] On secret sharing schemes, matroids and polymatroids
    Marti-Farre, Jaume
    Padro, Caries
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2007, 4392 : 273 - +
  • [40] On the Optimization of Bipartite Secret Sharing Schemes
    Farras, Oriol
    Metcalf-Burton, Jessica Ruth
    Padro, Carles
    Vazquez, Leonor
    INFORMATION THEORETIC SECURITY, 2010, 5973 : 93 - +