A Lightweight Public Verifiable Multi Secret Sharing Scheme Using Short Integer Solution

被引:1
作者
Massoud Hadian Dehkordi
Reza Ghasemi
机构
[1] Iran University of Science and Technology,
来源
Wireless Personal Communications | 2016年 / 91卷
关键词
Secret sharing; Multi secret; Lattice; Short Integer Solution; Verifiability; 94A60; 94A62;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper we introduce a multi secret sharing (MSS) scheme based on lattice conception. Lattice constitutes the core of many cryptographic constructions. The advantage of using lattice, which our scheme will inherit, is twofold: first is that the hardness of lattice problems is well understood. We will show that breaking our scheme leads to a solution for the robust Short Integer Solution problem. Hence, the presented scheme’s security is guaranteed by leveraging lattice based conceptions. Second advantage is that working with lattice is simple and, consequently, execution is fast. A main problem with previous schemes is that they mostly are based on numerical assumptions which are slow and need much throughput. Inheriting simplicity and fastness make our scheme an excellent choice to implement in facilities with limit computational power and resources. In secret sharing schemes, typically in any protocol, dishonest participants and dealer can cheat during execution. To mitigate these concerns we augment our scheme with verifiability properties, say verifiable and public verifiable secret sharing. Verifiability prevents the dealer to share wrong shares and public verifiability forces participants to submit their sub-shares correctly. In MSS schemes, releasing some public values which are used in recovering step is inevitable. At the end, a comprehensive comparison by a table in the conclusion section shows that the presented scheme has minimum number of public values among MSS schemes.
引用
收藏
页码:1459 / 1469
页数:10
相关论文
共 50 条
  • [31] A Cellular Automata Based Verifiable Multi-secret Sharing Scheme Without a Trusted Dealer
    LI Meng
    YU Jia
    HAO Rong
    [J]. ChineseJournalofElectronics, 2017, 26 (02) : 313 - 318
  • [32] A verifiable (k, n)-threshold dynamic quantum secret sharing scheme
    Li, Fulin
    Hu, Hang
    Zhu, Shixin
    Yan, Jiayun
    Ding, Jian
    [J]. QUANTUM INFORMATION PROCESSING, 2022, 21 (07)
  • [33] A verifiable (k, n)-threshold dynamic quantum secret sharing scheme
    Fulin Li
    Hang Hu
    Shixin Zhu
    Jiayun Yan
    Jian Ding
    [J]. Quantum Information Processing, 21
  • [34] A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme
    Jhanwar, Mahabir Prasad
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 273 - 287
  • [35] Computationally Secure Verifiable Secret Sharing Scheme for Distributing Many Secrets
    Ogata, Wakaha
    Araki, Toshinori
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (01) : 103 - 114
  • [36] Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme
    Wang, Na
    Cai, Yuanyuan
    Fu, Junsong
    Chen, Xiqi
    [J]. IEEE ACCESS, 2020, 8 : 20799 - 20804
  • [37] A Hierarchical Threshold Multi-secret Sharing Scheme
    Shi Runhua
    Zhong Hong
    [J]. 2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 231 - 234
  • [38] A secret sharing scheme based on integer decomposition and hexagonal structure
    Rouia Z.
    Lemnouar N.
    Rida A.M.
    [J]. International Journal of Information and Communication Technology, 2024, 24 (04) : 482 - 501
  • [39] A Label Graph Based Verifiable Secret Sharing Scheme for General Access Structures
    Hsu, Ching-Fang
    Zeng, Bing
    Cheng, Qi
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2013, 15 (04) : 407 - 410
  • [40] Verifiable Changeable Threshold Secret Image Sharing Scheme Based on LWE Problem
    Dehkordi, Massoud Hadian
    Mashhadi, Samaneh
    Farahi, Seyed Taghi
    Noorallahzadeh, Mohammad Hossein
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2024, 137 (02) : 1099 - 1118