ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism

被引:0
|
作者
Shi, Ruonan [1 ]
Chen, Yuling [1 ]
Tan, Chaoyue [1 ]
Luo, Yun [1 ]
Li, Tao [1 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang, Peoples R China
基金
中国国家自然科学基金;
关键词
Multi-secret sharing; Cloud computing; Rationality; Reputation mechanism;
D O I
10.1186/s13677-023-00495-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The traditional threshold secret sharing scheme only allows the participants' sub-secret shares to be used once in the reconstruction process. Several multi-secret sharing schemes have been proposed that are related to cloud computing, aiming to improve reconstruction efficiency. Rational secret sharing is a technique that combines secret sharing with game theory. In traditional rational multi-secret sharing, participants must reconstruct all secrets, resulting in unnecessary overhead. Rational participants will act dishonestly to maximize their own interests, leading to a prisoner's dilemma and incomplete secret reconstruction. Additionally, when sharing multiple secrets, the Dealer must distribute the sub-secret shares of all secrets to the participants, increasing overhead. In this paper, we propose a rational optional multi-secret sharing scheme based on a reputation mechanism that selectively reconstructs secrets according to participants' needs in the context of cloud computing. Our scheme introduces a reputation mechanism to evaluate participants' reputation values to avoid their dishonest behaviors. Furthermore, we adopt a broadcast encryption matrix so that participants only need to receive a single sub-secret share to participate in multi-secret reconstruction. Our security analysis shows that the proposed scheme can effectively constrain the self-interested behavior of rational participants and reduce the overhead in the process, thus multi-secret sharing scheme can provide more efficient and secure solutions for secret sharing in key management and distributive storage for the cloud scenarios.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] Verifiable multi-secret sharing scheme based on S-multiplication
    He, MX
    Fan, PZ
    Kaderali, F
    [J]. WAVELET ANALYSIS AND ITS APPLICATIONS, AND ACTIVE MEDIA TECHNOLOGY, VOLS 1 AND 2, 2004, : 602 - 608
  • [32] Extended Visual Cryptography Scheme for Multi-secret Sharing
    Reddy, L. Siva
    Prasad, Munaga V. N. K.
    [J]. PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 249 - 257
  • [33] A Modified Multi-secret Sharing Visual Cryptography Scheme
    Yu, Bin
    Fu, Zhengxin
    Fang, Liguo
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 912 - 915
  • [34] A generalized multi-secret sharing scheme to identify cheaters
    Huang, Zhi-Xiong
    Li, Qun-Hui
    Wei, Ren-Yong
    Li, Zhi-Yong
    [J]. Tiedao Xuebao/Journal of the China Railway Society, 2007, 29 (06): : 52 - 56
  • [35] A New (t, n) Multi-secret Sharing Scheme
    Tan, Xiao-qing
    Wang, Zhi-guo
    [J]. ICCEE 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2008, : 861 - +
  • [36] Multi-secret sharing threshold visual cryptography scheme
    Yu, Bin
    Xu, Xiaohui
    Fang, Liguo
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 815 - +
  • [37] Multi-Secret Image Sharing Scheme by Boolean Operations
    Chen, Chien-Chang
    Lin, Cheng-Shian
    Chen, Jia-Zhan
    [J]. 2022 IEEE 18TH INTERNATIONAL COLLOQUIUM ON SIGNAL PROCESSING & APPLICATIONS (CSPA 2022), 2022, : 397 - 402
  • [38] A New Double Layer Multi-Secret Sharing Scheme
    Elavarasi Gunasekaran
    Vanitha Muthuraman
    [J]. China Communications, 2024, 21 (01) : 297 - 309
  • [39] A secure Boolean-based multi-secret image sharing scheme
    Chen, Chien-Chang
    Wu, Wei-Jie
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2014, 92 : 107 - 114
  • [40] Efficient verifiable multi-secret sharing scheme based on hash function
    Shao, Jun
    [J]. INFORMATION SCIENCES, 2014, 278 : 104 - 109