A Lightweight Public Verifiable Multi Secret Sharing Scheme Using Short Integer Solution

被引:1
作者
Massoud Hadian Dehkordi
Reza Ghasemi
机构
[1] Iran University of Science and Technology,
来源
Wireless Personal Communications | 2016年 / 91卷
关键词
Secret sharing; Multi secret; Lattice; Short Integer Solution; Verifiability; 94A60; 94A62;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper we introduce a multi secret sharing (MSS) scheme based on lattice conception. Lattice constitutes the core of many cryptographic constructions. The advantage of using lattice, which our scheme will inherit, is twofold: first is that the hardness of lattice problems is well understood. We will show that breaking our scheme leads to a solution for the robust Short Integer Solution problem. Hence, the presented scheme’s security is guaranteed by leveraging lattice based conceptions. Second advantage is that working with lattice is simple and, consequently, execution is fast. A main problem with previous schemes is that they mostly are based on numerical assumptions which are slow and need much throughput. Inheriting simplicity and fastness make our scheme an excellent choice to implement in facilities with limit computational power and resources. In secret sharing schemes, typically in any protocol, dishonest participants and dealer can cheat during execution. To mitigate these concerns we augment our scheme with verifiability properties, say verifiable and public verifiable secret sharing. Verifiability prevents the dealer to share wrong shares and public verifiability forces participants to submit their sub-shares correctly. In MSS schemes, releasing some public values which are used in recovering step is inevitable. At the end, a comprehensive comparison by a table in the conclusion section shows that the presented scheme has minimum number of public values among MSS schemes.
引用
收藏
页码:1459 / 1469
页数:10
相关论文
共 50 条
[41]   Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing [J].
Li, Guojia ;
You, Lin ;
Hu, Gengran ;
Hu, Liqin .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (08) :2865-2878
[42]   Multi-secret Sharing Scheme Using Modular Inverse for Compartmented Access Structure [J].
Basit, Abdul ;
Venkaiah, V. Ch ;
Moiz, Salman Abdul .
DATA ENGINEERING AND COMMUNICATION TECHNOLOGY, ICDECT-2K19, 2020, 1079 :371-385
[43]   Verifiable Image Secret Sharing in Matrix Projection Using Watermarking [J].
Patil, Sonali ;
Deshmukh, Prashant .
2014 INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEMS, COMMUNICATION AND INFORMATION TECHNOLOGY APPLICATIONS (CSCITA), 2014, :225-229
[44]   Novel Verifiable General Secret Sharing Using Weil Pairing [J].
Zhao, Jianjie ;
Gu, Dawu ;
Wang, Yong .
WISM: 2009 INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, :524-+
[45]   Efficient Multi-secret Sharing Scheme Using Room Square [J].
Li, Ming-Jheng ;
Chang, Ying-Hsuan ;
Juan, Justie Su-Tzu .
2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, :260-266
[46]   Privacy Preserving Distributed K-Means Clustering in Malicious Model Using Verifiable Secret Sharing Scheme [J].
Patel, Sankita ;
Sonar, Mitali ;
Jinwala, Devesh C. .
INTERNATIONAL JOURNAL OF DISTRIBUTED SYSTEMS AND TECHNOLOGIES, 2014, 5 (02) :44-70
[47]   An efficient verifiable (t,n)-threshold secret image sharing scheme with ultralight shares [J].
Chattopadhyay, Arup Kumar ;
Nag, Amitava ;
Singh, Jyoti Prakash .
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (24) :34969-34999
[48]   An efficient verifiable (t,n)-threshold secret image sharing scheme with ultralight shares [J].
Arup Kumar Chattopadhyay ;
Amitava Nag ;
Jyoti Prakash Singh .
Multimedia Tools and Applications, 2022, 81 :34969-34999
[49]   Security analysis and improvement of two verifiable multi-secret sharing schemes [J].
Yu, Jia ;
Hao, Rong ;
Cheng, Xiangguo .
International Journal of Security and Networks, 2013, 8 (04) :200-206
[50]   An unconditionally secure multi-round revocation scheme using secret sharing [J].
Yang, Ming .
TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, 2006, :630-635