Verifiable Multi-secret Sharing Schemes from Homogeneous Linear Recursion

被引:0
|
作者
He Jun [1 ,2 ]
Li Lijuan [3 ]
Li Ximei [1 ,2 ]
Tang Chunming [4 ,5 ]
机构
[1] HuaiHua Vocat & Tech Coll, Comp & Informat Engn Dept, Huaihua 418000, Hunan, Peoples R China
[2] Huaihua Vocational & Tech Coll, Dept Comp & Informat Engn, Huaihua, Hunan, Peoples R China
[3] Hunan Univ, Sch Comp Commun, Changsha 410082, Hunan, Peoples R China
[4] Guangzhou Univ, Sch Math Informat Sci, Guangzhou, Guangdong, Peoples R China
[5] Chinese Acad Sci, Inst Software Sci, State Key Lab Informat Secur, Beijing 100080, Peoples R China
关键词
cryptography; verifiable multi-secret sharing; homogeneous linear recursion;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The research on secure and efficient implementation method of secret sharing has been a hotspot in the field of information security and cryptography. Based on homogeneous linear recursion, we construct two new verifiable multi-secret sharing schemes. In our schemes, all participants themselves select their shares, so the calculation amount of dealer is reduced and secure channel between the dealer and any participant is avoided. Compared with other similar schemes, our schemes have more advantage, such as low calculation amount and no secure channel. In addition, security analysis also shows that our schemes can resist ordinary attacks.
引用
收藏
页码:370 / 373
页数:4
相关论文
共 50 条
  • [41] A verifiable multi-secret image sharing scheme based on DNA encryption
    Chattopadhyay A.K.
    Saha S.
    Nag A.
    Singh J.P.
    Multimedia Tools and Applications, 2025, 84 (4) : 1967 - 1983
  • [42] A (n, t, n) Verifiable Multi-secret Sharing Scheme with Secure Secret Reconstruction
    Meng, Li
    Qu Shaoyun
    Xun Tiantian
    Jia, Yu
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 191 - 204
  • [43] A New Verifiable Multi-secret Sharing Scheme Realizing Adversary Structure
    Dehkordi, Masoud Hadian
    Farzaneh, Yousof
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (03) : 1749 - 1758
  • [44] A Verifiable Multi-Secret Sharing Scheme Based on Short Integer Solution
    LI Fulin
    YAN Jiayun
    ZHU Shixin
    HU Hang
    ChineseJournalofElectronics, 2023, 32 (03) : 556 - 563
  • [45] A New Verifiable Multi-secret Sharing Scheme Realizing Adversary Structure
    Masoud Hadian Dehkordi
    Yousof Farzaneh
    Wireless Personal Communications, 2015, 82 : 1749 - 1758
  • [46] A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps
    Ziba Eslami
    Saideh Kabiri Rad
    Wireless Personal Communications, 2012, 63 : 459 - 467
  • [47] A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps
    Eslami, Ziba
    Rad, Saideh Kabiri
    WIRELESS PERSONAL COMMUNICATIONS, 2012, 63 (02) : 459 - 467
  • [48] Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves
    Dehkordi, Massoud Hadian
    Mashhadi, Samaneh
    COMPUTER COMMUNICATIONS, 2008, 31 (09) : 1777 - 1784
  • [49] The Complexity and Randomness of Linear Multi-secret Sharing Schemes with Non-threshold Structures
    Chun-ming Tang
    Shu-guang DAI
    Acta Mathematicae Applicatae Sinica, 2014, (04) : 1073 - 1084
  • [50] The complexity and randomness of linear multi-secret sharing schemes with non-threshold structures
    Chun-ming Tang
    Shu-guang Dai
    Acta Mathematicae Applicatae Sinica, English Series, 2014, 30 : 1073 - 1084