Lattice-Based Secret Sharing Scheme (Chinese Remainder Theorem)

被引:0
|
作者
Dong, Songshou [1 ,2 ,3 ]
Yao, Yanqing [1 ,2 ,3 ]
Zhou, Yihua [4 ,5 ]
Yang, Yuguang [4 ,5 ]
机构
[1] Beihang Univ, State Key Lab Software Dev Environm, Beijing 100191, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Beihang Univ, Sch Cyber Sci & Technol, Key Lab Aerosp Network Secur, Minist Ind & Informat Technol, Beijing 100191, Peoples R China
[4] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
[5] Beijing Key Lab Trusted Comp, Beijing 100124, Peoples R China
基金
中国国家自然科学基金;
关键词
Chinese remainder theorem; secret sharing; lattice; post-quantum; verifiable;
D O I
10.1007/978-3-031-56583-0_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret sharing schemes are used as a tool in many cryptographic protocols including revocable electronic cash, electronic voting, cloud computing and key management in sensor networks. But the existing post-quantum secret sharing schemes are all based on Shamir's (t, n) threshold scheme, there is currently no post-quantum secret sharing scheme based on the Chinese Remainder Theorem (CRT), so we construct a verifiable lattice-based secret sharing scheme using some number theory methods and interaction methods. Furthermore, we prove our scheme is safe in the post-quantum era. Finally, we compare our scheme with other schemes. And the comparison shows that our scheme is more efficient and occupies less memory.
引用
收藏
页码:54 / 62
页数:9
相关论文
共 50 条
  • [1] A proactive secret sharing scheme based on Chinese remainder theorem
    Meng, Keju
    Miao, Fuyou
    Ning, Yu
    Huang, Wenchao
    Xiong, Yan
    Chang, Chin-Chen
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2021, 15 (02)
  • [2] A proactive secret sharing scheme based on Chinese remainder theorem
    Keju MENG
    Fuyou MIAO
    Yu NING
    Wenchao HUANG
    Yan XIONG
    ChinChen CHANG
    [J]. Frontiers of Computer Science., 2021, (02) - 136
  • [3] Sequential Secret Sharing Scheme Based on Chinese Remainder Theorem
    Singh, Nidhi
    Tentu, Appala Naidu
    Basit, Abdul
    Venkaiah, V. Ch.
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH, 2016, : 583 - 588
  • [4] A collaborative secret sharing scheme based on the Chinese Remainder Theorem
    Jia, Xingxing
    Song, Yixuan
    Wang, Daoshun
    Nie, Daxin
    Wu, Jinzhao
    [J]. MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2019, 16 (03) : 1280 - 1299
  • [5] A proactive secret sharing scheme based on Chinese remainder theorem
    Keju Meng
    Fuyou Miao
    Yu Ning
    Wenchao Huang
    Yan Xiong
    Chin-Chen Chang
    [J]. Frontiers of Computer Science, 2021, 15
  • [6] A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem
    Kaya, Kamer
    Selcuk, Ali Aydin
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 414 - 425
  • [7] A Threshold Secret Sharing Scheme Based on LMCA and Chinese Remainder Theorem
    Lu, Dianjun
    Wang, Yu
    Zhang, Xiaoqin
    Ji, Lanfen
    [J]. PROCEEDINGS OF 2016 9TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 2, 2016, : 439 - 442
  • [8] An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem
    Zhang, Yun
    Tartary, Christophe
    Wang, Huaxiong
    [J]. INFORMATION SECURITY AND PRIVACY, 2011, 6812 : 259 - +
  • [9] An efficient generalized secret sharing scheme based on Chinese Remainder Theorem
    Chang, Chin-Chen
    Yang, Jen-Ho
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION AND MANAGEMENT SCIENCES, 2006, 5 : 333 - 336
  • [10] Publicly verifiable secret sharing scheme based on the Chinese Remainder Theorem
    Jia, Xingxing
    Wang, Daoshun
    Wu, Yujiang
    [J]. ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING, PTS 1-3, 2013, 278-280 : 1945 - +