Secret sharing schemes with detection of cheaters for a general access structure

被引:0
作者
Cabello, S [1 ]
Padró, C [1 ]
Sáez, G [1 ]
机构
[1] Univ Politecn Catalunya, Dep Matemat Aplicada & Telemat, ES-08034 Barcelona, Spain
来源
FUNDAMENTALS OF COMPUTATION THEORY | 1999年 / 1684卷
关键词
cryptography; secret sharing schemes; detection of cheaters; robust and secure schemes;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In a secret sharing scheme, some participants can lie about the value of their shares when reconstructing the secret in order to obtain some illicit benefits. We present in this paper two methods to modify any linear secret sharing scheme in order to obtain schemes that are unconditionally secure against that kind of attack. The schemes obtained by the first method are robust, that is, cheaters are detected with high probability even if they know the value of the secret. The second method provides secure schemes, in which cheaters that do not know the secret are detected with high probability. When applied to ideal linear secret sharing schemes, our methods provide robust and secure schemes whose relation between the probability of cheating and the information rate is almost optimal. Besides, those methods make it possible to construct robust and secure schemes for any access structure.
引用
收藏
页码:185 / 194
页数:10
相关论文
共 50 条
  • [41] On the optimization of bipartite secret sharing schemes
    Oriol Farràs
    Jessica Ruth Metcalf-Burton
    Carles Padró
    Leonor Vázquez
    [J]. Designs, Codes and Cryptography, 2012, 63 : 255 - 271
  • [42] A Linear Construction of Secret Sharing Schemes
    Marten van Dijk
    [J]. Designs, Codes and Cryptography, 1997, 12 (2) : 161 - 201
  • [43] On the optimization of bipartite secret sharing schemes
    Farras, Oriol
    Metcalf-Burton, Jessica Ruth
    Padro, Carles
    Vazquez, Leonor
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2012, 63 (02) : 255 - 271
  • [44] An Efficient and Secure Multi-Secret Sharing Scheme with General Access Structures
    PANG Liaojun~ 1
    2. School of Computer Science
    [J]. WuhanUniversityJournalofNaturalSciences, 2006, (06) : 1649 - 1652
  • [45] Secret sharing schemes with three or four minimal qualified subsets
    Martí-Farré, J
    Padró, C
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2005, 34 (01) : 17 - 34
  • [46] Secret Sharing Schemes with Three or Four Minimal Qualified Subsets
    Jaume Martí-Farré
    Carles Padró
    [J]. Designs, Codes and Cryptography, 2005, 34 : 17 - 34
  • [47] The optimal linear secret sharing scheme for any given access structure
    Tang Chunming
    Gao Shuhong
    Zhang Chengli
    [J]. JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2013, 26 (04) : 634 - 649
  • [48] The optimal linear secret sharing scheme for any given access structure
    Chunming Tang
    Shuhong Gao
    Chengli Zhang
    [J]. Journal of Systems Science and Complexity, 2013, 26 : 634 - 649
  • [49] THE OPTIMAL LINEAR SECRET SHARING SCHEME FOR ANY GIVEN ACCESS STRUCTURE
    TANG Chunming
    GAO Shuhong
    ZHANG Chengli
    [J]. JournalofSystemsScience&Complexity, 2013, 26 (04) : 634 - 649
  • [50] Secret sharing schemes on sparse homogeneous access structures with rank three -: art. no. R72
    Martí-Farré, J
    Padró, C
    [J]. ELECTRONIC JOURNAL OF COMBINATORICS, 2004, 11 (01)