Secret sharing schemes with cheating detection

被引:0
作者
Horng, G [1 ]
机构
[1] Natl Chung Hsing Univ, Inst Comp Sci, Taichung 40227, Taiwan
关键词
secret sharing; cheating detection; access structure; threshold scheme; multiple assignment scheme;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A secret sharing scheme allows a secret to be shared among a set of participants, P, such that only authorized subsets of P can recover the secret, but any unauthorized subset can not recover the secret. It can be used to protect important secret data, such as cryptographic keys, from being lost or destroyed without accidental or malicious exposure. In this paper, we consider secret sharing schemes based on interpolating polynomials. We show that, by simply increasing the number of shares held by each participant, there is a multiple assignment scheme for any monotone access structure such that cheating can be detected with very high probability by any honest participant even the cheaters form a coalition in order to deceive him.
引用
收藏
页码:845 / 850
页数:6
相关论文
共 20 条
  • [1] BENALOH J, 1990, LECT NOTES COMPUT SC, V403, P27
  • [2] Blakley G. R., 1979, AFIPS Conference Proceedings, vol.48. 1979 National Computer Conference, P313, DOI 10.1109/MARK.1979.8817296
  • [3] THE DETECTION OF CHEATERS IN THRESHOLD SCHEMES
    BRICKELL, EF
    STINSON, DR
    [J]. SIAM JOURNAL ON DISCRETE MATHEMATICS, 1991, 4 (04) : 502 - 510
  • [4] Capocelli R. M., 1993, Journal of Cryptology, V6, P157, DOI 10.1007/BF00198463
  • [5] Carpentieri M., 1995, Designs, Codes and Cryptography, V5, P183, DOI 10.1007/BF01388382
  • [6] CARPENTIERI M, 1993, LNCS, V765, P118
  • [7] Efficient cheater identification method for threshold schemes
    Chang, CC
    Hwang, RJ
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1997, 144 (01): : 23 - 27
  • [8] Chor B., 1985, P 26 IEEE S FDN COMP, P383
  • [9] Shared Secret Reconstruction
    He J.
    Dawson E.
    [J]. Designs, Codes and Cryptography, 1998, 14 (3) : 221 - 237
  • [10] Ito M., 1993, Journal of Cryptology, V6, P15, DOI 10.1007/BF02620229