An extensible cheat-proofing multi-secret sharing scheme with low computation complexity

被引:4
作者
Wu, Yinfeng [1 ]
Huang, Liping [1 ]
Wang, Xiao [1 ]
Yu, Ning [1 ]
机构
[1] Beihang Univ, Sch Instrumentat Sci & Optoelect Engn, Beijing 100191, Peoples R China
基金
中国国家自然科学基金;
关键词
secret sharing; multi-secret; cheat-proofing; expandability; low computation complexity;
D O I
10.1002/sec.823
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret sharing schemes are widely applied in various areas, and there are series of achievements, among which the verifiable multi-secret schemes are the most representative ones. A few verifiable multi-secret schemes own the following drawbacks: insensitive to the differences of security levels, lack of expandability, high computation complexity of verification process, and low efficiency of execution. Addressing the issues, an extensible cheat-proofing multi-secret sharing scheme with low computation complexity is proposed. With the security of RSA public key system and discrete logarithm puzzle, the proposed scheme can realize the following functions: first, the secret dealer can set relatively threshold values according to different security levels; second, the participants and secret combiner can verify the secret shares, which can guard against cheating problem, resist various kinds of attacks and improve the success rate of secret reconstruction; in addition, the secret shares are reusable in the situations of new group secret and new participant joining the group, which brings about good expandability. Moreover, compared with the previous schemes, the proposed scheme reduces the information content published by secret dealer and brings down the computation complexity of verification, which makes the efficiency of the scheme greatly improved. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:1042 / 1048
页数:7
相关论文
共 19 条
[1]  
[Anonymous], ADV CRYPTOLOGY CRYPT
[2]  
[Anonymous], 2008, INT J CONT MATH SCI, DOI DOI 10.1109/ICACT.2007.358655
[3]  
[Anonymous], P AFIPS 1979 NAT COM
[4]  
Benaloh J, 1998, ADV CRYPTOLOGY CRYPT, P27
[5]  
Chor B., 1985, P 26 IEEE S FDN COMP, P383
[6]   An efficient multi-use multi-secret sharing scheme based on hash function [J].
Das, Angsuman ;
Adhikari, Avishek .
APPLIED MATHEMATICS LETTERS, 2010, 23 (09) :993-996
[7]   A verifiable multi-secret sharing scheme based on cellular automata [J].
Eslami, Z. ;
Ahmadabadi, J. Zarepour .
INFORMATION SCIENCES, 2010, 180 (15) :2889-2894
[8]   A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps [J].
Eslami, Ziba ;
Rad, Saideh Kabiri .
WIRELESS PERSONAL COMMUNICATIONS, 2012, 63 (02) :459-467
[9]  
Feldman P, 1987, P 28 IEEE S FDN COMP, P472
[10]  
Geng Y, 2007, WECWIS 01, P1515