Secret sharing schemes with detection of cheaters for a general access structure

被引:0
作者
Cabello, S [1 ]
Padró, C [1 ]
Sáez, G [1 ]
机构
[1] Univ Politecn Catalunya, Dep Matemat Aplicada & Telemat, ES-08034 Barcelona, Spain
来源
FUNDAMENTALS OF COMPUTATION THEORY | 1999年 / 1684卷
关键词
cryptography; secret sharing schemes; detection of cheaters; robust and secure schemes;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In a secret sharing scheme, some participants can lie about the value of their shares when reconstructing the secret in order to obtain some illicit benefits. We present in this paper two methods to modify any linear secret sharing scheme in order to obtain schemes that are unconditionally secure against that kind of attack. The schemes obtained by the first method are robust, that is, cheaters are detected with high probability even if they know the value of the secret. The second method provides secure schemes, in which cheaters that do not know the secret are detected with high probability. When applied to ideal linear secret sharing schemes, our methods provide robust and secure schemes whose relation between the probability of cheating and the information rate is almost optimal. Besides, those methods make it possible to construct robust and secure schemes for any access structure.
引用
收藏
页码:185 / 194
页数:10
相关论文
共 50 条
  • [21] A new image secret sharing scheme to identify cheaters
    Zhao, Rong
    Zhao, Jian-jie
    Dai, Fang
    Zhao, Feng-qun
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 252 - 257
  • [22] Secret Sharing Schemes for (k, n)-Consecutive Access Structures
    Herranz, Javier
    Saez, German
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2018, 2018, 11124 : 463 - 480
  • [23] On secret sharing schemes
    Blundo, C
    De Santis, A
    Vaccaro, U
    INFORMATION PROCESSING LETTERS, 1998, 65 (01) : 25 - 32
  • [24] On secret reconstruction in secret sharing schemes
    Wang, Huaxiong
    Wong, Duncan S.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (01) : 473 - 480
  • [25] Cyber Attack Detection using Secret Sharing Schemes
    Chum, Chi Sing
    Wei, Xinzhou
    Zhang, Xiaowen
    2023 IEEE 9TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD, BIGDATASECURITY, IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, HPSC AND IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY, IDS, 2023, : 57 - 59
  • [26] Verifiable secret sharing with changeable access structure
    Ghebleh, Mohammad
    Kanso, Ali
    Abuhasan, Haya
    DISCRETE MATHEMATICS ALGORITHMS AND APPLICATIONS, 2025, 17 (03)
  • [27] MDS secret-sharing scheme secure against cheaters
    Okada, K
    Kurosawa, K
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (03) : 1078 - 1081
  • [28] Applying secret sharing schemes to service reputation
    Namin, AS
    Wei, RZ
    Shen, WM
    Ghenniwa, H
    PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS 1 AND 2, 2005, : 696 - 703
  • [29] ON THE COMPOSITION OF SECRET SHARING SCHEMES RELATED TO CODES
    Marquez-Corbella, I.
    Martinez-Moro, E.
    Suarez-Canedo, E.
    DISCRETE MATHEMATICS ALGORITHMS AND APPLICATIONS, 2014, 6 (01)
  • [30] Contrast-improved visual secret sharing based on random grid for general access structure
    Yan, Xuehu
    Lu, Yuliang
    DIGITAL SIGNAL PROCESSING, 2017, 71 : 36 - 45