Verifiable Multi-secret Sharing Schemes from Homogeneous Linear Recursion

被引:0
|
作者
He Jun [1 ,2 ]
Li Lijuan [3 ]
Li Ximei [1 ,2 ]
Tang Chunming [4 ,5 ]
机构
[1] HuaiHua Vocat & Tech Coll, Comp & Informat Engn Dept, Huaihua 418000, Hunan, Peoples R China
[2] Huaihua Vocational & Tech Coll, Dept Comp & Informat Engn, Huaihua, Hunan, Peoples R China
[3] Hunan Univ, Sch Comp Commun, Changsha 410082, Hunan, Peoples R China
[4] Guangzhou Univ, Sch Math Informat Sci, Guangzhou, Guangdong, Peoples R China
[5] Chinese Acad Sci, Inst Software Sci, State Key Lab Informat Secur, Beijing 100080, Peoples R China
关键词
cryptography; verifiable multi-secret sharing; homogeneous linear recursion;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The research on secure and efficient implementation method of secret sharing has been a hotspot in the field of information security and cryptography. Based on homogeneous linear recursion, we construct two new verifiable multi-secret sharing schemes. In our schemes, all participants themselves select their shares, so the calculation amount of dealer is reduced and secure channel between the dealer and any participant is avoided. Compared with other similar schemes, our schemes have more advantage, such as low calculation amount and no secure channel. In addition, security analysis also shows that our schemes can resist ordinary attacks.
引用
收藏
页码:370 / 373
页数:4
相关论文
共 50 条
  • [31] Leakage-resilient verifiable multi-secret sharing scheme
    Shen H.
    Chen M.-W.
    Zhang M.-W.
    Beijing Youdian Daxue Xuebao, 1 (87-91): : 87 - 91
  • [32] Three (t, n)-secret image sharing schemes based on homogeneous linear recursion
    Charoghchi, Sara
    Mashhadi, Samaneh
    INFORMATION SCIENCES, 2021, 552 : 220 - 243
  • [33] Consideration for multi-threshold multi-secret sharing schemes
    Waseda, Atsushi
    Soshi, Masakazu
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2012), 2012, : 265 - 269
  • [34] New results and applications for multi-secret sharing schemes
    Herranz, Javier
    Ruiz, Alexandre
    Saez, German
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 73 (03) : 841 - 864
  • [35] New results and applications for multi-secret sharing schemes
    Javier Herranz
    Alexandre Ruiz
    Germán Sáez
    Designs, Codes and Cryptography, 2014, 73 : 841 - 864
  • [36] Verifiable multi-secret sharing scheme based on S-multiplication
    He, MX
    Fan, PZ
    Kaderali, F
    WAVELET ANALYSIS AND ITS APPLICATIONS, AND ACTIVE MEDIA TECHNOLOGY, VOLS 1 AND 2, 2004, : 602 - 608
  • [37] Secure secret reconstruction and multi-secret sharing schemes with unconditional security
    Harn, Lein
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (03) : 567 - 573
  • [38] Efficient verifiable multi-secret sharing scheme based on hash function
    Shao, Jun
    INFORMATION SCIENCES, 2014, 278 : 104 - 109
  • [39] A Verifiable Multi-Secret Sharing Scheme Based on Short Integer Solution
    Li Fulin
    Yan Jiayun
    Zhu Shixin
    Hu Hang
    CHINESE JOURNAL OF ELECTRONICS, 2023, 32 (03) : 556 - 563
  • [40] An Efficient Verifiable Threshold Multi-Secret Sharing Scheme With Different Stages
    Chen, Dong
    Lu, Wei
    Xing, Weiwei
    Wang, Na
    IEEE ACCESS, 2019, 7 : 107104 - 107110