A Finite Equivalence of Verifiable Multi-secret Sharing

被引:0
|
作者
Hui Zhao
Mingchu Li
Kouichi Sakurai
Yizhi Ren
Jonathan Z. Sun
Fengying Wang
机构
[1] Shandong University of Technology,Computer Science and Technology School
[2] Dalian University of Technology,Software School
[3] Kyushu University,Department of Informatics
[4] Hangzhou Dianzi University,Software School
[5] The University of Southern Mississippi,School of Computing
来源
International Journal of Computational Intelligence Systems | 2012年 / 5卷
关键词
Pi-calculus; Secret-sharing; Formal analysis; Protocol verifier;
D O I
暂无
中图分类号
学科分类号
摘要
We give an abstraction of verifiable multi-secret sharing schemes that is accessible to a fully mechanized analysis. This abstraction is formalized within the applied pi-calculus by using an equational theory which characterizes the cryptographic semantics of secret share. We also present an encoding from the equational theory into a convergent rewriting system, which is suitable for the automated protocol verifier ProVerif. Based on that, we verify the threshold certificate protocol in ProVerif.
引用
收藏
页码:1 / 12
页数:11
相关论文
共 50 条
  • [1] A Finite Equivalence of Verifiable Multi-secret Sharing
    Zhao, Hui
    Li, Mingchu
    Sakurai, Kouichi
    Ren, Yizhi
    Sun, Jonathan Z.
    Wang, Fengying
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2012, 5 (01) : 1 - 12
  • [2] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138
  • [3] Verifiable Rational Multi-secret Sharing Scheme
    Cai, Yongquan
    Luo, Zhanhai
    Yang, Yi
    INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 : 42 - 48
  • [4] A verifiable multi-secret sharing scheme (VMSS)
    Pang Liaojun
    Li Huixian
    Jiao Licheng
    Wang Yumin
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 749 - +
  • [5] An efficient threshold verifiable multi-secret sharing
    Dehkordi, Massoud Hadian
    Mashhadi, Samaneh
    COMPUTER STANDARDS & INTERFACES, 2008, 30 (03) : 187 - 190
  • [6] On Novel Verifiable Multi-Secret Sharing Scheme
    Wang, Jian
    Liu, Yanheng
    Wang, Yanxi
    ADVANCED SCIENCE LETTERS, 2011, 4 (11-12) : 3709 - 3715
  • [7] A practical verifiable multi-secret sharing scheme
    Zhao, Jianjie
    Zhang, Jianzhong
    Zhao, Rong
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) : 138 - 141
  • [8] Verifiable threshold multi-secret sharing scheme
    Pang, Liao-Jun
    Li, Hui-Xian
    Li, Zhi-Jie
    Wang, Yu-Min
    Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2008, 40 (09): : 1462 - 1465
  • [9] Verifiable multi-secret sharing based on LFSR sequences
    Hu, Chunqiang
    Liao, Xiaofeng
    Cheng, Xiuzhen
    THEORETICAL COMPUTER SCIENCE, 2012, 445 : 52 - 62
  • [10] A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction
    Lin, Changlu
    Hu, Huidan
    Chang, Chin-Chen
    Tang, Shaohua
    IEEE ACCESS, 2018, 6 : 70666 - 70673