Secure and verifiable vector space secret sharing scheme

被引:0
作者
Xiao, QH [1 ]
Ping, LD [1 ]
Pan, XZ [1 ]
机构
[1] Zhejiang Univ, Inst Syst Architecture, Hangzhou 310027, Peoples R China
来源
PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOL 2 | 2004年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a method to detect cheaters efficiently with a trusted dealer distributing the secret information in the initialization phase and renewing phase by means of the intractability of quadratic residue problem. The new vector space secret sharing scheme demands every participant verb the share he receives and those other participants show. When untruthful dealers appear, the scheme can also be extended to find them. Results indicate that this solution is very simple with high security and high information rate. Cheaters can only cheat via guessing with little probability.
引用
收藏
页码:689 / 693
页数:5
相关论文
共 50 条
[31]   A Verifiable E-voting Scheme with Secret Sharing [J].
Yuan, Lifeng ;
Li, Mingchu ;
Guo, Cheng ;
Hu, Weitong ;
Tan, Xing .
2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, :304-308
[32]   A verifiable multi-secret sharing scheme (VMSS) [J].
Pang Liaojun ;
Li Huixian ;
Jiao Licheng ;
Wang Yumin .
CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, :749-+
[33]   Proactive Verifiable Linear Integer Secret Sharing Scheme [J].
Ma, Chuangui ;
Ding, Xiaofei .
INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2009, 5927 :439-448
[34]   Verifiable Rational Secret Sharing Scheme in Mobile Networks [J].
Zhang, En ;
Yuan, Peiyan ;
Du, Jiao .
MOBILE INFORMATION SYSTEMS, 2015, 2015
[36]   NONINTERACTIVE AND INFORMATION-THEORETIC SECURE VERIFIABLE SECRET SHARING [J].
PEDERSEN, TP .
LECTURE NOTES IN COMPUTER SCIENCE, 1992, 576 :129-140
[37]   INFORMATION-THEORETICALLY SECURE STRONG VERIFIABLE SECRET SHARING [J].
Lin, Changlu ;
Harn, Lein ;
Ye, Dingfeng .
SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, :233-+
[38]   Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data [J].
Dowsley, Rafael ;
Mueller-Quade, Joern ;
Otsuka, Akira ;
Hanaoka, Goichiro ;
Imai, Hideki ;
Nascimento, Anderson C. A. .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (02) :725-734
[39]   Provably secure verifiable multi-stage secret sharing scheme based on monotone span program [J].
Mashhadi, Samaneh ;
Dehkordi, Massoud Hadian ;
Kiamari, Niloofar .
IET INFORMATION SECURITY, 2017, 11 (06) :326-331
[40]   A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction [J].
Lin, Changlu ;
Hu, Huidan ;
Chang, Chin-Chen ;
Tang, Shaohua .
IEEE ACCESS, 2018, 6 :70666-70673