THE DETECTION OF CHEATERS IN THRESHOLD SCHEMES

被引:26
作者
BRICKELL, EF [1 ]
STINSON, DR [1 ]
机构
[1] UNIV NEBRASKA, LINCOLN, NE 68588 USA
关键词
THRESHOLD SCHEME; SECRET SHARING SCHEME;
D O I
10.1137/0404044
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Informally, a (t, w)-threshold scheme is a way of distributing partial information (shadows) to w participants, so that any t of them can easily calculate a key (or secret), but no subset of fewer than t participants can determine the key. Presented in this paper is an unconditionally secure threshold scheme in which any cheating participant can be detected and identified with high probability by any honest participant, even if the cheater is in coalition with other participants. Also given is a construction that will detect with high probability a dealer who distributes inconsistent shadows (shares) to the honest participants. The scheme is not perfect; a set of t - 1 participants can rule out at most 1 + t-1w-t+1) possible keys, given the information they have. In this scheme, the key will be an element of GF(q) for some prime power q. Hence q can be chosen large enough so that the amount of information obtained by any t - 1 participants is negligible.
引用
收藏
页码:502 / 510
页数:9
相关论文
共 12 条
  • [1] BENALOH JC, 1987, LECT NOTES COMPUT SC, V263, P251
  • [2] Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
  • [3] Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214
  • [4] CHAUM D, 1988, COMMUNICATION
  • [5] Chor B., 1985, 26th Annual Symposium on Foundations of Computer Science (Cat. No.85CH2224-4), P383, DOI 10.1109/SFCS.1985.64
  • [6] FELDMAN P, 1986, 28TH P IEEE S F COMP, P427
  • [7] Goldreich O., 1986, 27th Annual Symposium on Foundations of Computer Science (Cat. No.86CH2354-9), P174, DOI 10.1109/SFCS.1986.47
  • [8] ON SHARING SECRETS AND REED-SOLOMON CODES
    MCELIECE, RJ
    SARWATE, DV
    [J]. COMMUNICATIONS OF THE ACM, 1981, 24 (09) : 583 - 584
  • [9] RABIN T, 1989, 21 STOC, P73
  • [10] HOW TO SHARE A SECRET
    SHAMIR, A
    [J]. COMMUNICATIONS OF THE ACM, 1979, 22 (11) : 612 - 613