Secure and verifiable vector space secret sharing scheme

被引:0
作者
Xiao, QH [1 ]
Ping, LD [1 ]
Pan, XZ [1 ]
机构
[1] Zhejiang Univ, Inst Syst Architecture, Hangzhou 310027, Peoples R China
来源
PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOL 2 | 2004年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a method to detect cheaters efficiently with a trusted dealer distributing the secret information in the initialization phase and renewing phase by means of the intractability of quadratic residue problem. The new vector space secret sharing scheme demands every participant verb the share he receives and those other participants show. When untruthful dealers appear, the scheme can also be extended to find them. Results indicate that this solution is very simple with high security and high information rate. Cheaters can only cheat via guessing with little probability.
引用
收藏
页码:689 / 693
页数:5
相关论文
共 50 条
[21]   Information-theoretical secure verifiable secret sharing with vector space access structures over bilinear groups and its applications [J].
Zhang, Jie ;
Zhang, Futai .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 52 :109-115
[22]   Verifiable Rational Multi-secret Sharing Scheme [J].
Cai, Yongquan ;
Luo, Zhanhai ;
Yang, Yi .
INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 :42-48
[23]   A new space efficient secret sharing scheme without a secure channel [J].
Liu, Yan-Hong ;
Zhang, Fu-Tai .
Jisuanji Xuebao/Chinese Journal of Computers, 2012, 35 (09) :1816-1822
[24]   A Verifiable Lossless Multiple Secret Images Sharing Scheme [J].
Bhat, Krishnaraj .
INFORMATION SYSTEMS SECURITY, ICISS 2021, 2021, 13146 :157-172
[25]   Verifiable Secret Sharing Scheme on Images using Watermarking [J].
Roy, Chitradeep Dutta ;
Choudhury, Neel ;
Chatterjee, Amrik ;
Adhikari, Avishek .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (02) :76-81
[26]   On Novel Verifiable Multi-Secret Sharing Scheme [J].
Wang, Jian ;
Liu, Yanheng ;
Wang, Yanxi .
ADVANCED SCIENCE LETTERS, 2011, 4 (11-12) :3709-3715
[27]   A practical verifiable multi-secret sharing scheme [J].
Zhao, Jianjie ;
Zhang, Jianzhong ;
Zhao, Rong .
COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) :138-141
[28]   Verifiable threshold multi-secret sharing scheme [J].
Pang, Liao-Jun ;
Li, Hui-Xian ;
Li, Zhi-Jie ;
Wang, Yu-Min .
Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2008, 40 (09) :1462-1465
[29]   Verifiable Secret Sharing Scheme Using Hash Values [J].
Imai, Junta ;
Mimura, Mamoru ;
Tanaka, Hidema .
2018 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2018), 2018, :405-409
[30]   A verifiable threshold secret sharing scheme based on lattices [J].
Rajabi, Bahman ;
Eslami, Ziba .
INFORMATION SCIENCES, 2019, 501 :655-661