An efficient (t, n) multi-secret sharing scheme with verification

被引:0
作者
Pang, L. J. [1 ]
Li, H. X.
Jiao, L. C.
Wang, Y. M. [1 ]
机构
[1] Xidian Univ, Minist Educ Key Lab Comp Netw & Info Secu, Xian 710071, Peoples R China
来源
2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2 | 2008年
关键词
information security; secret sharing; multi-secret sharing scheme; threshold scheme;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret sharing plays an important role in the information security. The number of the secrets that can be in each session provides a performance measure of the secret sharing. Recently, a new type of (t, n) multi-secret sharing scheme is proposed, in which multiple secrets instead of only one secret can be shared in each sharing session. This type of schemes has found important applications such as sharing a large secret. However, most of the existing schemes have no property of verification. Although there are a few verifiable schemes, they need a secure channel established in advance, which is impractical for applications more or less. Motivated by these concerns, a new verifiable (t, n) multi-secret sharing scheme is proposed. Besides merits of the existing schemes, the new scheme can check whether each participant or the dealer is a cheater or not, and it needs no secure channel. Analyses show that the proposed scheme is a secure and efficient scheme.
引用
收藏
页码:552 / 557
页数:6
相关论文
共 13 条
[1]  
[Anonymous], 2002, CRYPTOGRAPHY THEORY
[2]  
BLAKLEY GR, 1979, P AM FED INF PROC 19, P313
[3]  
Chien HY, 2000, IEICE T FUND ELECTR, VE83A, P2762
[4]   EFFICIENT SHARING (BROADCASTING) OF MULTIPLE SECRETS [J].
HARN, L .
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1995, 142 (03) :237-240
[5]   MULTISTAGE SECRET SHARING BASED ON ONE-WAY FUNCTION [J].
HARN, L .
ELECTRONICS LETTERS, 1995, 31 (04) :262-262
[6]   MULTISTAGE SECRET SHARING BASED ON ONE-WAY FUNCTION [J].
HE, J ;
DAWSON, E .
ELECTRONICS LETTERS, 1994, 30 (19) :1591-1592
[7]   MULTISECRET-SHARING SCHEME BASED ON ONE-WAY FUNCTION [J].
HE, J ;
DAWSON, E .
ELECTRONICS LETTERS, 1995, 31 (02) :93-95
[8]  
LI HX, 2007, P 2 INT C FUZZ I ASC, V40, P911
[9]   A new (t,n) multi-secret sharing scheme based on Shamir's secret sharing [J].
Pang, LJ ;
Wang, YM .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (02) :840-848
[10]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613