Verifiable Multi-secret Sharing Schemes from Homogeneous Linear Recursion

被引:0
|
作者
He Jun [1 ,2 ]
Li Lijuan [3 ]
Li Ximei [1 ,2 ]
Tang Chunming [4 ,5 ]
机构
[1] HuaiHua Vocat & Tech Coll, Comp & Informat Engn Dept, Huaihua 418000, Hunan, Peoples R China
[2] Huaihua Vocational & Tech Coll, Dept Comp & Informat Engn, Huaihua, Hunan, Peoples R China
[3] Hunan Univ, Sch Comp Commun, Changsha 410082, Hunan, Peoples R China
[4] Guangzhou Univ, Sch Math Informat Sci, Guangzhou, Guangdong, Peoples R China
[5] Chinese Acad Sci, Inst Software Sci, State Key Lab Informat Secur, Beijing 100080, Peoples R China
关键词
cryptography; verifiable multi-secret sharing; homogeneous linear recursion;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The research on secure and efficient implementation method of secret sharing has been a hotspot in the field of information security and cryptography. Based on homogeneous linear recursion, we construct two new verifiable multi-secret sharing schemes. In our schemes, all participants themselves select their shares, so the calculation amount of dealer is reduced and secure channel between the dealer and any participant is avoided. Compared with other similar schemes, our schemes have more advantage, such as low calculation amount and no secure channel. In addition, security analysis also shows that our schemes can resist ordinary attacks.
引用
收藏
页码:370 / 373
页数:4
相关论文
共 50 条
  • [1] On the Construction and Analysis of Verifiable Multi-secret Sharing Based on Non-homogeneous Linear Recursion
    Zhang, Ben-Hui
    Tang, Yuan-Sheng
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 34 (03) : 749 - 763
  • [2] On the Construction and Analysis of Verifiable Multi-secret Sharing Based on Non-homogeneous Linear Recursion*
    Zhang B.-H.
    Tang Y.-S.
    2018, Institute of Information Science (34) : 749 - 763
  • [3] Linear multi-secret sharing schemes
    Liangliang Xiao
    Mulan Liu
    Science in China Series F: Information Sciences, 2005, 48 : 125 - 136
  • [4] Linear multi-secret sharing schemes
    Xiao, LL
    Liu, ML
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2005, 48 (01): : 125 - 136
  • [5] Linear multi-secret sharing schemes
    XIAO Liangliang & LIU Mulan Academy of Mathematics and System Sciences and Key Laboratory of Mathematics Mechanization
    Science in China(Series F:Information Sciences), 2005, (01) : 125 - 136
  • [6] New efficient and practical verifiable multi-secret sharing schemes
    Dehkordi, Massoud Hadian
    Mashhadi, Samaneh
    INFORMATION SCIENCES, 2008, 178 (09) : 2262 - 2274
  • [7] Verifiable Multi-Secret Sharing Based on Non-Homogeneous Linear Recursions Revisited
    Zhang, Ben-Hui
    Tang, Yuan-Sheng
    Chen, Wen-Bing
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 183 - 190
  • [8] Attacks to some verifiable multi-secret sharing schemes and two improved schemes
    Liu, Yanhong
    Zhang, Futai
    Zhang, Jie
    INFORMATION SCIENCES, 2016, 329 : 524 - 539
  • [9] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138
  • [10] Security analysis and improvement of two verifiable multi-secret sharing schemes
    Yu, Jia
    Hao, Rong
    Cheng, Xiangguo
    International Journal of Security and Networks, 2013, 8 (04) : 200 - 206