An efficient multi-use multi-secret sharing scheme based on hash function

被引:46
作者
Das, Angsuman [1 ]
Adhikari, Avishek [1 ]
机构
[1] Univ Calcutta, Dept Pure Math, Kolkata 700019, India
关键词
Pseudo-secret share; Renewable; Multi-use; Verifiable;
D O I
10.1016/j.aml.2010.04.024
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In this work, a renewable, multi-use, multi-secret sharing scheme for general access structure based on the one-way collision resistant hash function is presented in which each participant has to carry only one share. As it applies the collision resistant one-way hash function, the proposed scheme is secure against conspiracy attacks even if the pseudo-secret shares are compromised. Moreover, high complexity operations like modular multiplication, exponentiation and inversion are avoided to increase its efficiency. Finally, in the proposed scheme, both the combiner and the participants can verify the correctness of the information exchanged among themselves. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:993 / 996
页数:4
相关论文
共 12 条
[1]  
[Anonymous], 2008, INT J CONT MATH SCI, DOI DOI 10.1109/ICACT.2007.358655
[2]  
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[3]   An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme [J].
Chang, TY ;
Hwang, MS ;
Yang, WP .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 163 (01) :169-178
[4]   An efficient threshold verifiable multi-secret sharing [J].
Dehkordi, Massoud Hadian ;
Mashhadi, Samaneh .
COMPUTER STANDARDS & INTERFACES, 2008, 30 (03) :187-190
[5]  
Geng YJ, 2007, 9th International Conference on Advanced Communication Technology: Toward Network Innovation Beyond Evolution, Vols 1-3, P1515
[6]   MULTISTAGE SECRET SHARING BASED ON ONE-WAY FUNCTION [J].
HE, J ;
DAWSON, E .
ELECTRONICS LETTERS, 1994, 30 (19) :1591-1592
[7]  
LIN TY, 1999, IEE P COMPUTERS DIGI, V146
[8]  
Pang L.J., 2006, WUHAN U J NATURAL SC, V11
[9]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[10]  
Stadler M, 1996, LECT NOTES COMPUT SC, V1070, P190