A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction

被引:14
|
作者
Lin, Changlu [1 ,2 ]
Hu, Huidan [1 ,2 ]
Chang, Chin-Chen [3 ]
Tang, Shaohua [4 ]
机构
[1] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350117, Fujian, Peoples R China
[2] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350007, Fujian, Peoples R China
[3] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[4] South China Univ Technol, Sch Comp Sci & Engn, Guangzhou 510006, Guangdong, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Data confidentiality; computation integrity; multiple secret sharing; outsourcing computation; verifiable secret sharing;
D O I
10.1109/ACCESS.2018.2880975
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A publicly verifiable secret sharing (PVSS) scheme enjoys the public verification and the lower cost of communication than VSS scheme. However, the existing PVSS schemes cannot be applied in the scenarios of the devices with low computation ability and do not share the multiple secrets among all participants efficiently. In this paper, an efficient publicly verifiable multi-secret sharing scheme with outsourcing secret reconstruction is proposed. Each participant only spends a small amount of computational cost to recover multiple secrets because of the expensive burden of computation and verifiability is outsourced to the cloud service provider (CSP). Moreover, the CSP knows no information of the secrets, and the participants have the abilities to verify the returned result. We also prove that our scheme is secure under the hardness assumption of the discrete logarithm problem and the modified generalized bilinear inversion problem.
引用
收藏
页码:70666 / 70673
页数:8
相关论文
共 50 条
  • [1] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138
  • [2] Publicly verifiable multi-secret sharing scheme from bilinear pairings
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    IET INFORMATION SECURITY, 2013, 7 (03) : 239 - 246
  • [3] Verifiable Rational Multi-secret Sharing Scheme
    Cai, Yongquan
    Luo, Zhanhai
    Yang, Yi
    INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 : 42 - 48
  • [4] A verifiable multi-secret sharing scheme (VMSS)
    Pang Liaojun
    Li Huixian
    Jiao Licheng
    Wang Yumin
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 749 - +
  • [5] A (n, t, n) Verifiable Multi-secret Sharing Scheme with Secure Secret Reconstruction
    Meng, Li
    Qu Shaoyun
    Xun Tiantian
    Jia, Yu
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 191 - 204
  • [6] On Novel Verifiable Multi-Secret Sharing Scheme
    Wang, Jian
    Liu, Yanheng
    Wang, Yanxi
    ADVANCED SCIENCE LETTERS, 2011, 4 (11-12) : 3709 - 3715
  • [7] A practical verifiable multi-secret sharing scheme
    Zhao, Jianjie
    Zhang, Jianzhong
    Zhao, Rong
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) : 138 - 141
  • [8] Verifiable threshold multi-secret sharing scheme
    Pang, Liao-Jun
    Li, Hui-Xian
    Li, Zhi-Jie
    Wang, Yu-Min
    Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2008, 40 (09): : 1462 - 1465
  • [9] A non-interactive (t, n)-publicly verifiable multi-secret sharing scheme
    Samaneh Mashahdi
    Bagher Bagherpour
    Ali Zaghian
    Designs, Codes and Cryptography, 2022, 90 : 1761 - 1782
  • [10] A non-interactive (t, n)-publicly verifiable multi-secret sharing scheme
    Mashahdi, Samaneh
    Bagherpour, Bagher
    Zaghian, Ali
    DESIGNS CODES AND CRYPTOGRAPHY, 2022, 90 (08) : 1761 - 1782