A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction

被引:14
作者
Lin, Changlu [1 ,2 ]
Hu, Huidan [1 ,2 ]
Chang, Chin-Chen [3 ]
Tang, Shaohua [4 ]
机构
[1] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350117, Fujian, Peoples R China
[2] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350007, Fujian, Peoples R China
[3] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[4] South China Univ Technol, Sch Comp Sci & Engn, Guangzhou 510006, Guangdong, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Data confidentiality; computation integrity; multiple secret sharing; outsourcing computation; verifiable secret sharing;
D O I
10.1109/ACCESS.2018.2880975
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A publicly verifiable secret sharing (PVSS) scheme enjoys the public verification and the lower cost of communication than VSS scheme. However, the existing PVSS schemes cannot be applied in the scenarios of the devices with low computation ability and do not share the multiple secrets among all participants efficiently. In this paper, an efficient publicly verifiable multi-secret sharing scheme with outsourcing secret reconstruction is proposed. Each participant only spends a small amount of computational cost to recover multiple secrets because of the expensive burden of computation and verifiability is outsourced to the cloud service provider (CSP). Moreover, the CSP knows no information of the secrets, and the participants have the abilities to verify the returned result. We also prove that our scheme is secure under the hardness assumption of the discrete logarithm problem and the modified generalized bilinear inversion problem.
引用
收藏
页码:70666 / 70673
页数:8
相关论文
共 26 条
[1]  
[Anonymous], 1999, LECT NOTES COMPUTER, DOI DOI 10.1007/3-540-48405-1_10
[2]  
[Anonymous], LECT NOTES COMPUTER
[3]  
[Anonymous], INT J NETW SECUR
[4]  
[Anonymous], LECT NOTES COMPUTER
[5]  
[Anonymous], 1987, 19 ACM STOC, DOI [DOI 10.1145/28395.28420, 10.1145/28395.28420]
[6]  
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[7]   New Algorithms for Secure Outsourcing of Modular Exponentiations [J].
Chen, Xiaofeng ;
Li, Jin ;
Ma, Jianfeng ;
Tang, Qiang ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (09) :2386-2396
[8]  
Chen Z., 2018, PROC IEEE INT C COMM, P1
[9]   A Lightweight Public Verifiable Multi Secret Sharing Scheme Using Short Integer Solution [J].
Dehkordi, Massoud Hadian ;
Ghasemi, Reza .
WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (03) :1459-1469
[10]   Efficient and secure outsourcing of bilinear pairings with single server [J].
Dong, Min ;
Ren, Yanli .
SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (03)