Secure and verifiable vector space secret sharing scheme

被引:0
作者
Xiao, QH [1 ]
Ping, LD [1 ]
Pan, XZ [1 ]
机构
[1] Zhejiang Univ, Inst Syst Architecture, Hangzhou 310027, Peoples R China
来源
PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOL 2 | 2004年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a method to detect cheaters efficiently with a trusted dealer distributing the secret information in the initialization phase and renewing phase by means of the intractability of quadratic residue problem. The new vector space secret sharing scheme demands every participant verb the share he receives and those other participants show. When untruthful dealers appear, the scheme can also be extended to find them. Results indicate that this solution is very simple with high security and high information rate. Cheaters can only cheat via guessing with little probability.
引用
收藏
页码:689 / 693
页数:5
相关论文
共 50 条
[41]   Strong (n,t,n) verifiable secret sharing scheme [J].
Harn, Lein ;
Lin, Changlu .
INFORMATION SCIENCES, 2010, 180 (16) :3059-3064
[42]   A novel verifiable weighted threshold quantum secret sharing scheme [J].
Dong, Yumin ;
Luo, Yi ;
Fu, Yanying .
PHYSICA SCRIPTA, 2023, 98 (06)
[43]   VPSS: A verifiable proactive secret sharing scheme in distributed systems [J].
Pramanik, S ;
Upadhyaya, S .
MILCOM 2003 - 2003 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2003, :826-831
[44]   A verifiable secret sharing scheme with combiner verification and cheater identification [J].
Kandar, Shyamalendu ;
Dhara, Bibhas Chandra .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 51
[45]   A novel non-interactive verifiable secret sharing scheme [J].
Ao, Jun ;
Liao, Guisheng ;
Ma, Chunbo .
2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, :1525-+
[46]   A verifiable variable threshold visual image secret sharing scheme [J].
Yang, Yu-Guang ;
Cheng, Wen ;
Xu, Guang-Bao ;
Jiang, Dong-Huan ;
Zhou, Yi-Hua ;
Shi, Wei-Min ;
Jiang, Dong-Hua .
MULTIMEDIA SYSTEMS, 2025, 31 (03)
[47]   A new approach of Secret Image Sharing using Verifiable Scheme [J].
Rao, Jyoti ;
Venny, Priya .
2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, :1134-1139
[48]   A verifiable rational secret sharing scheme based on bilinear pairing [J].
Zhang, E. (zhangenzdrj@163.com), 1600, Chinese Institute of Electronics (40) :1050-1054
[49]   Verifiable Quantum Secret Sharing Scheme Based on LDPC Codes [J].
Bai, Chen-Ming ;
Feng, Yanan ;
Zhang, Sujuan ;
Liu, Lu .
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2024, 63 (01)
[50]   Verifiable Quantum Secret Sharing Scheme Based on LDPC Codes [J].
Chen-Ming Bai ;
Yanan Feng ;
Sujuan Zhang ;
Lu Liu .
International Journal of Theoretical Physics, 63