An efficient threshold verifiable multi-secret sharing

被引:49
作者
Dehkordi, Massoud Hadian [1 ]
Mashhadi, Samaneh [1 ]
机构
[1] Iran Univ Sci & Technol, Dept Math, Tehran, Iran
关键词
threshold scheme; multi-secret sharing; RSA cryptosystem; secure channel;
D O I
10.1016/j.csi.2007.08.004
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In 2004, C.-C. Yang, T.-Y. Chang and M.-S. Hwang proposed an efficient multi-secret sharing scheme based on two-variable one-way function and Shamir's secret sharing. In order to add the verifiable property into previous scheme, J. Shao and Z. Cao proposed an efficient (t,n) verifiable multi-secret sharing based on YCH [C.-C. Yang, T.-Y. Chang, M.-S. Hwang, A (t,n) multi-secret sharing scheme, Applied Mathematics and Computation 151 (2004) pp. 483-490.] in 2005. Both of the previous schemes need a secure channel. This paper presents a verifiable multi-secret sharing based on YCH, intractability of Discrete Logarithm (DL) and RSA cryptosystem. In our scheme each participant chooses her/his shadow by her/himself and there is not any need to a secure channel. In addition, compared with Shao and Cao scheme, verifiable property is more efficient in our scheme. (C) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:187 / 190
页数:4
相关论文
共 14 条
[1]  
[Anonymous], 2002, CRYPTOGRAPHY THEORY
[2]  
BLAKLEY GR, 1979, P AM FED INF PROC 19, P313
[3]  
BUCHMANN JA, 2001, INTRO CRYPTOGRAPHY
[4]  
Chen L., 1997, P 2 AUSTR C INF SEC
[5]  
Chien HY, 2000, IEICE T FUND ELECTR, VE83A, P2762
[6]  
CHOR B, 1985, P 26 IEEE S FDN COMP, P251
[7]   EFFICIENT SHARING (BROADCASTING) OF MULTIPLE SECRETS [J].
HARN, L .
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1995, 142 (03) :237-240
[8]   MULTISTAGE SECRET SHARING BASED ON ONE-WAY FUNCTION [J].
HE, J ;
DAWSON, E .
ELECTRONICS LETTERS, 1994, 30 (19) :1591-1592
[9]   MULTISECRET-SHARING SCHEME BASED ON ONE-WAY FUNCTION [J].
HE, J ;
DAWSON, E .
ELECTRONICS LETTERS, 1995, 31 (02) :93-95
[10]   An on-line secret sharing scheme for multi-secrets [J].
Hwang, RJ ;
Chang, CC .
COMPUTER COMMUNICATIONS, 1998, 21 (13) :1170-1176