Secure and verifiable vector space secret sharing scheme

被引:0
|
作者
Xiao, QH [1 ]
Ping, LD [1 ]
Pan, XZ [1 ]
机构
[1] Zhejiang Univ, Inst Syst Architecture, Hangzhou 310027, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a method to detect cheaters efficiently with a trusted dealer distributing the secret information in the initialization phase and renewing phase by means of the intractability of quadratic residue problem. The new vector space secret sharing scheme demands every participant verb the share he receives and those other participants show. When untruthful dealers appear, the scheme can also be extended to find them. Results indicate that this solution is very simple with high security and high information rate. Cheaters can only cheat via guessing with little probability.
引用
收藏
页码:689 / 693
页数:5
相关论文
共 50 条
  • [21] Information-theoretical secure verifiable secret sharing with vector space access structures over bilinear groups and its applications
    Zhang, Jie
    Zhang, Futai
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 52 : 109 - 115
  • [22] Verifiable Rational Multi-secret Sharing Scheme
    Cai, Yongquan
    Luo, Zhanhai
    Yang, Yi
    INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 : 42 - 48
  • [23] A new space efficient secret sharing scheme without a secure channel
    Liu, Yan-Hong
    Zhang, Fu-Tai
    Jisuanji Xuebao/Chinese Journal of Computers, 2012, 35 (09): : 1816 - 1822
  • [24] A practical verifiable multi-secret sharing scheme
    Zhao, Jianjie
    Zhang, Jianzhong
    Zhao, Rong
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) : 138 - 141
  • [25] Verifiable threshold multi-secret sharing scheme
    Pang, Liao-Jun
    Li, Hui-Xian
    Li, Zhi-Jie
    Wang, Yu-Min
    Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2008, 40 (09): : 1462 - 1465
  • [26] Verifiable Secret Sharing Scheme Using Hash Values
    Imai, Junta
    Mimura, Mamoru
    Tanaka, Hidema
    2018 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2018), 2018, : 405 - 409
  • [27] A Verifiable E-voting Scheme with Secret Sharing
    Yuan, Lifeng
    Li, Mingchu
    Guo, Cheng
    Hu, Weitong
    Tan, Xing
    2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 304 - 308
  • [28] A verifiable threshold secret sharing scheme based on lattices
    Rajabi, Bahman
    Eslami, Ziba
    INFORMATION SCIENCES, 2019, 501 : 655 - 661
  • [29] A verifiable multi-secret sharing scheme (VMSS)
    Pang Liaojun
    Li Huixian
    Jiao Licheng
    Wang Yumin
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 749 - +
  • [30] Proactive Verifiable Linear Integer Secret Sharing Scheme
    Ma, Chuangui
    Ding, Xiaofei
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2009, 5927 : 439 - 448