Secret sharing schemes with detection of cheaters for a general access structure

被引:0
作者
Cabello, S [1 ]
Padró, C [1 ]
Sáez, G [1 ]
机构
[1] Univ Politecn Catalunya, Dep Matemat Aplicada & Telemat, ES-08034 Barcelona, Spain
来源
FUNDAMENTALS OF COMPUTATION THEORY | 1999年 / 1684卷
关键词
cryptography; secret sharing schemes; detection of cheaters; robust and secure schemes;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In a secret sharing scheme, some participants can lie about the value of their shares when reconstructing the secret in order to obtain some illicit benefits. We present in this paper two methods to modify any linear secret sharing scheme in order to obtain schemes that are unconditionally secure against that kind of attack. The schemes obtained by the first method are robust, that is, cheaters are detected with high probability even if they know the value of the secret. The second method provides secure schemes, in which cheaters that do not know the secret are detected with high probability. When applied to ideal linear secret sharing schemes, our methods provide robust and secure schemes whose relation between the probability of cheating and the information rate is almost optimal. Besides, those methods make it possible to construct robust and secure schemes for any access structure.
引用
收藏
页码:185 / 194
页数:10
相关论文
共 50 条
  • [31] Equivalence of Non-Perfect Secret Sharing and Symmetric Private Information Retrieval With General Access Structure
    Song, Seunghoan
    Hayashi, Masahito
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2022, 40 (03) : 999 - 1012
  • [32] Compartmented Secret Sharing Schemes and Locally Repairable Codes
    Chen, Qi
    Tang, Chunming
    Lin, Zhiqiang
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (10) : 5976 - 5987
  • [33] A Weak Security Notion for Visual Secret Sharing Schemes
    Iwamoto, Mitsugu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) : 372 - 382
  • [34] Secret image sharing scheme with hierarchical threshold access structure
    Pakniat, Nasrollah
    Noroozi, Mahnaz
    Eslami, Ziba
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (05) : 1093 - 1101
  • [35] A New Gradual Secret Sharing Scheme with Diverse Access Structure
    Jamal Zarepour-Ahmadabadi
    MohammadEbrahim Shiri-Ahmadabadi
    Ali Miri
    AliMohammad Latif
    Wireless Personal Communications, 2018, 99 : 1329 - 1344
  • [36] A New Gradual Secret Sharing Scheme with Diverse Access Structure
    Zarepour-Ahmadabadi, Jamal
    Shiri-Ahmadabadi, MohammadEbrahim
    Miri, Ali
    Latif, AliMohammad
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 99 (03) : 1329 - 1344
  • [37] On the Optimization of Bipartite Secret Sharing Schemes
    Farras, Oriol
    Metcalf-Burton, Jessica Ruth
    Padro, Carles
    Vazquez, Leonor
    INFORMATION THEORETIC SECURITY, 2010, 5973 : 93 - +
  • [38] Probability of shares in secret sharing schemes
    Blundo, C
    De Santis, A
    Gaggia, AG
    INFORMATION PROCESSING LETTERS, 1999, 72 (5-6) : 169 - 175
  • [39] Weighted threshold secret sharing schemes
    Morillo, P
    Padró, C
    Sáez, G
    Villar, JL
    INFORMATION PROCESSING LETTERS, 1999, 70 (05) : 211 - 216
  • [40] On the bound for anonymous secret sharing schemes
    Kishimoto, W
    Okada, K
    Kurosawa, K
    Ogata, W
    DISCRETE APPLIED MATHEMATICS, 2002, 121 (1-3) : 193 - 202