Computationally Secure Robust Multi-secret Sharing for General Access Structure

被引:1
作者
Das, Angsuman [1 ]
Roy, Partha Sarathi [2 ]
Adhikari, Avishek [2 ]
机构
[1] St Xaviers Coll, Dept Math, Kolkata, India
[2] Univ Calcutta, Dept Pure Math, Kolkata, India
来源
MATHEMATICS AND COMPUTING | 2015年 / 139卷
关键词
Robust secret sharing; General access structure; Computational security; SCHEME;
D O I
10.1007/978-81-322-2452-5_9
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Secret sharing scheme plays a crucial role in distributed cryptosystems. Due to its extensive use in numerous applications, an important goal in this area is to minimize trust among the participants. To remove this bottleneck, robust secret sharing, which allows the correct secret to be recovered even when some of the shares presented during an attempted reconstruction are incorrect, can be an efficient tool. However, as unconditional security demands honest majority and share size to be at least equal to the size of the secret, the need for computational security of such schemes has been felt over the years, specially in case of multi-secret sharing schemes. In this paper, we provide a notion of computationally robust multi-secret sharing scheme for general access structure. We also propose a robust multi-secret sharing scheme for general access structure and prove its computational security under the proposed notation.
引用
收藏
页码:123 / 134
页数:12
相关论文
共 21 条
[1]  
[Anonymous], [No title captured]
[2]  
Bellare M, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P172
[3]  
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[4]   An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme [J].
Chang, TY ;
Hwang, MS ;
Yang, WP .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 163 (01) :169-178
[5]  
Damgard Ivan, 2013, Cryptography and Coding. 14th IMA International Conference, IMACC 2013. Proceedings: LNCS 8308, P270, DOI 10.1007/978-3-642-45239-0_16
[6]   An efficient multi-use multi-secret sharing scheme based on hash function [J].
Das, Angsuman ;
Adhikari, Avishek .
APPLIED MATHEMATICS LETTERS, 2010, 23 (09) :993-996
[7]   An efficient threshold verifiable multi-secret sharing [J].
Dehkordi, Massoud Hadian ;
Mashhadi, Samaneh .
COMPUTER STANDARDS & INTERFACES, 2008, 30 (03) :187-190
[8]  
Geng YJ, 2007, 9th International Conference on Advanced Communication Technology: Toward Network Innovation Beyond Evolution, Vols 1-3, P1515
[9]   MULTISTAGE SECRET SHARING BASED ON ONE-WAY FUNCTION [J].
HE, J ;
DAWSON, E .
ELECTRONICS LETTERS, 1994, 30 (19) :1591-1592
[10]   MULTISECRET-SHARING SCHEME BASED ON ONE-WAY FUNCTION [J].
HE, J ;
DAWSON, E .
ELECTRONICS LETTERS, 1995, 31 (02) :93-95