ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism

被引:0
|
作者
Shi, Ruonan [1 ]
Chen, Yuling [1 ]
Tan, Chaoyue [1 ]
Luo, Yun [1 ]
Li, Tao [1 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang, Peoples R China
基金
中国国家自然科学基金;
关键词
Multi-secret sharing; Cloud computing; Rationality; Reputation mechanism;
D O I
10.1186/s13677-023-00495-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The traditional threshold secret sharing scheme only allows the participants' sub-secret shares to be used once in the reconstruction process. Several multi-secret sharing schemes have been proposed that are related to cloud computing, aiming to improve reconstruction efficiency. Rational secret sharing is a technique that combines secret sharing with game theory. In traditional rational multi-secret sharing, participants must reconstruct all secrets, resulting in unnecessary overhead. Rational participants will act dishonestly to maximize their own interests, leading to a prisoner's dilemma and incomplete secret reconstruction. Additionally, when sharing multiple secrets, the Dealer must distribute the sub-secret shares of all secrets to the participants, increasing overhead. In this paper, we propose a rational optional multi-secret sharing scheme based on a reputation mechanism that selectively reconstructs secrets according to participants' needs in the context of cloud computing. Our scheme introduces a reputation mechanism to evaluate participants' reputation values to avoid their dishonest behaviors. Furthermore, we adopt a broadcast encryption matrix so that participants only need to receive a single sub-secret share to participate in multi-secret reconstruction. Our security analysis shows that the proposed scheme can effectively constrain the self-interested behavior of rational participants and reduce the overhead in the process, thus multi-secret sharing scheme can provide more efficient and secure solutions for secret sharing in key management and distributive storage for the cloud scenarios.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism
    Ruonan Shi
    Yuling Chen
    Chaoyue Tan
    Yun Luo
    Tao Li
    [J]. Journal of Cloud Computing, 12
  • [2] Verifiable Rational Multi-secret Sharing Scheme
    Cai, Yongquan
    Luo, Zhanhai
    Yang, Yi
    [J]. INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 : 42 - 48
  • [3] Rational multi-secret sharing scheme based on bit commitment protocol
    Cai, Yongquan
    Luo, Zhanhai
    Yang, Yi
    [J]. Journal of Networks, 2012, 7 (04) : 738 - 745
  • [4] A scheme for threshold multi-secret sharing
    Chan, CW
    Chang, CC
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) : 1 - 14
  • [5] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    [J]. INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138
  • [6] A threshold multi-secret sharing scheme
    Shi Runhua
    Huang Liusheng
    Luo yonglong
    Zhong Hong
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1705 - +
  • [7] An ideal multi-secret sharing scheme based on MSP
    Hsu, Ching-Fang
    Cheng, Qi
    Tang, Xueming
    Zeng, Bing
    [J]. INFORMATION SCIENCES, 2011, 181 (07) : 1403 - 1409
  • [8] AN IDEAL MULTI-SECRET SHARING SCHEME BASED ON MSP
    Hei, Zan
    Li, Zhi-Hui
    Wu, Xingxing
    [J]. QUANTITATIVE LOGIC AND SOFT COMPUTING, 2012, 5 : 246 - 251
  • [9] A new multi-secret image sharing scheme based on DCT
    Oinam Bidyapati Chanu
    Arambam Neelima
    [J]. The Visual Computer, 2020, 36 : 939 - 950
  • [10] A verifiable multi-secret sharing scheme based on cellular automata
    Eslami, Z.
    Ahmadabadi, J. Zarepour
    [J]. INFORMATION SCIENCES, 2010, 180 (15) : 2889 - 2894