A Lightweight Public Verifiable Multi Secret Sharing Scheme Using Short Integer Solution

被引:1
|
作者
Massoud Hadian Dehkordi
Reza Ghasemi
机构
[1] Iran University of Science and Technology,
来源
Wireless Personal Communications | 2016年 / 91卷
关键词
Secret sharing; Multi secret; Lattice; Short Integer Solution; Verifiability; 94A60; 94A62;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper we introduce a multi secret sharing (MSS) scheme based on lattice conception. Lattice constitutes the core of many cryptographic constructions. The advantage of using lattice, which our scheme will inherit, is twofold: first is that the hardness of lattice problems is well understood. We will show that breaking our scheme leads to a solution for the robust Short Integer Solution problem. Hence, the presented scheme’s security is guaranteed by leveraging lattice based conceptions. Second advantage is that working with lattice is simple and, consequently, execution is fast. A main problem with previous schemes is that they mostly are based on numerical assumptions which are slow and need much throughput. Inheriting simplicity and fastness make our scheme an excellent choice to implement in facilities with limit computational power and resources. In secret sharing schemes, typically in any protocol, dishonest participants and dealer can cheat during execution. To mitigate these concerns we augment our scheme with verifiability properties, say verifiable and public verifiable secret sharing. Verifiability prevents the dealer to share wrong shares and public verifiability forces participants to submit their sub-shares correctly. In MSS schemes, releasing some public values which are used in recovering step is inevitable. At the end, a comprehensive comparison by a table in the conclusion section shows that the presented scheme has minimum number of public values among MSS schemes.
引用
收藏
页码:1459 / 1469
页数:10
相关论文
共 50 条
  • [11] On Novel Verifiable Multi-Secret Sharing Scheme
    Wang, Jian
    Liu, Yanheng
    Wang, Yanxi
    ADVANCED SCIENCE LETTERS, 2011, 4 (11-12) : 3709 - 3715
  • [12] A Verifiable Secret Sharing Scheme without Using Multi-Party Computations
    Makino, Takumi
    Kamidoi, Yoko
    Wakabayashi, Shin'ichi
    2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 845 - 850
  • [13] Verifiable Secret Sharing Scheme Using Hash Values
    Imai, Junta
    Mimura, Mamoru
    Tanaka, Hidema
    2018 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2018), 2018, : 405 - 409
  • [14] Verifiable Secret Sharing Scheme on Images using Watermarking
    Roy, Chitradeep Dutta
    Choudhury, Neel
    Chatterjee, Amrik
    Adhikari, Avishek
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (02): : 76 - 81
  • [15] A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction
    Lin, Changlu
    Hu, Huidan
    Chang, Chin-Chen
    Tang, Shaohua
    IEEE ACCESS, 2018, 6 : 70666 - 70673
  • [16] A Lightweight Verifiable Secret Sharing in Internet of Things
    Lu, Likang
    Lu, Jianzhu
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (05) : 1028 - 1035
  • [17] A new approach of Secret Image Sharing using Verifiable Scheme
    Rao, Jyoti
    Venny, Priya
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1134 - 1139
  • [18] A Novel Verifiable Dynamic Multi-Policy Secret Sharing Scheme
    Wang, Feng
    Gu, Lize
    Zheng, Shihui
    Yang, Yixian
    Hu, Zhengming
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 1474 - 1479
  • [19] A Verifiable Multi-Secret Sharing Scheme with Elliptic Curve Cryptography
    Chattopadhyay, Arup Kumar
    Maitra, Paramita
    Nag, Amitava
    Saha, Himadri Nath
    2018 IEEE 9TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2018, : 1374 - 1379
  • [20] A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure
    Alam, Irfan
    Alali, Amal S.
    Ali, Shakir
    Asri, Muhammad S. M.
    AXIOMS, 2024, 13 (08)