Optimum secret sharing scheme secure against cheating

被引:53
|
作者
Ogata, W
Kurosawa, K
Stinson, DR
机构
[1] Tokyo Inst Technol, Grad Sch Innovat Management, Meguro Ku, Tokyo 1528552, Japan
[2] Ibaraki Univ, Dept Comp & Informat Sci, Ibaraki 3168511, Japan
[3] Univ Waterloo, Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
关键词
cryptography; secret sharing schemes; cheaters; balanced incomplete block design; difference sets;
D O I
10.1137/S0895480100378689
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Tompa and Woll introduced a problem of cheating in (k, n) threshold secret sharing schemes. In this problem k - 1 malicious participants aim to cheat an honest one by opening forged shares and causing the honest participant to reconstruct the wrong secret. We first derive a tight lower bound on the size of shares \V-i\ for secret sharing schemes that protect against this type of attack: \V-i\ >= (\S\ - 1)/delta + 1, where V-i denotes the set of shares of participant P-i, S denotes the set of secrets, and delta denotes the cheating probability. We next present an optimum scheme, which meets the equality of our bound, by using "difference sets." A partial converse and some extensions are also shown.
引用
收藏
页码:79 / 95
页数:17
相关论文
共 50 条
  • [31] Cheating identifiable (k, n) threshold quantum secret sharing scheme
    Yan, Chenhong
    Li, Zhihui
    Liu, Lu
    Lu, Dianjun
    QUANTUM INFORMATION PROCESSING, 2022, 21 (01)
  • [32] Cheating Resistance for Secret Sharing
    Chan, Chao-Wen
    Chang, Chin-Chen
    Wang, Zhi-Hui
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 840 - +
  • [33] Provably Secure On-Line Secret Sharing Scheme
    Oba, Tatsumi
    Ogata, Wakaha
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 139 - 149
  • [34] Secure and Optimal Secret Sharing Scheme for Color Images
    Shankar, K.
    Taniar, David
    Yang, Eunmok
    Yi, Okyeon
    MATHEMATICS, 2021, 9 (19)
  • [35] Almost Optimum Secret Sharing Schemes with Cheating Detection for Random Bit Strings
    Hoshino, Hidetaka
    Obana, Satoshi
    ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 213 - 222
  • [36] A forward-secure scheme based on secret sharing
    Zhang, Jing
    Wei, Feng
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 4, 2008, : 1134 - 1138
  • [37] Secure and verifiable vector space secret sharing scheme
    Xiao, QH
    Ping, LD
    Pan, XZ
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOL 2, 2004, : 689 - 693
  • [38] A Secret Sharing Scheme for Secure Transmission of Color Images
    Kumar, Hirdesh
    Srivastava, Awadhesh
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), 2014, : 857 - 860
  • [39] SSeCloud: Using secret sharing scheme to secure keys
    Hu, Liang
    Huang, Yang
    Yang, Disheng
    Zhang, Yuzhen
    Liu, Hengchang
    2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, ENERGY TECHNOLOGY AND ENVIRONMENTAL ENGINEERING (MSETEE 2017), 2017, 81
  • [40] Toward a secure protection scheme for visual secret sharing
    Lee, C. -C.
    Lee, C. -C.
    Liu, H. -T.
    Tsai, C. -S.
    IMAGING SCIENCE JOURNAL, 2014, 62 (06): : 342 - 352