Optimum secret sharing scheme secure against cheating

被引:53
|
作者
Ogata, W
Kurosawa, K
Stinson, DR
机构
[1] Tokyo Inst Technol, Grad Sch Innovat Management, Meguro Ku, Tokyo 1528552, Japan
[2] Ibaraki Univ, Dept Comp & Informat Sci, Ibaraki 3168511, Japan
[3] Univ Waterloo, Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
关键词
cryptography; secret sharing schemes; cheaters; balanced incomplete block design; difference sets;
D O I
10.1137/S0895480100378689
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Tompa and Woll introduced a problem of cheating in (k, n) threshold secret sharing schemes. In this problem k - 1 malicious participants aim to cheat an honest one by opening forged shares and causing the honest participant to reconstruct the wrong secret. We first derive a tight lower bound on the size of shares \V-i\ for secret sharing schemes that protect against this type of attack: \V-i\ >= (\S\ - 1)/delta + 1, where V-i denotes the set of shares of participant P-i, S denotes the set of secrets, and delta denotes the cheating probability. We next present an optimum scheme, which meets the equality of our bound, by using "difference sets." A partial converse and some extensions are also shown.
引用
收藏
页码:79 / 95
页数:17
相关论文
共 50 条
  • [41] Efficient (k,n)Threshold secret sharing schemes secure against cheating from n-1 cheaters
    Araki, Toshinori
    Information Security and Privacy, Proceedings, 2007, 4586 : 133 - 142
  • [42] Efficient (k, n) Secret Sharing Scheme Secure Against k-2 Cheaters
    Zhu, Lei
    Liu, Yanxiao
    Wang, Yichuan
    Ji, Wenjiang
    Hei, Xinhong
    Yao, Quanzhu
    Zhu, Xiaoyan
    2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2017, : 1 - 4
  • [43] A Cheating-Detectable (k, L, n) Ramp Secret Sharing Scheme
    Nakamura, Wataru
    Yamamoto, Hirosuke
    Chan, Terence
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (12) : 2709 - 2719
  • [45] Strictly cheating immune secret sharing
    Zhang, J
    Wen, QY
    ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 514 - 519
  • [46] Computationally Secure Cheating Identifiable Multi-Secret Sharing for General Access Structure
    Roy, Partha Sarathi
    Das, Angsuman
    Adhikari, Avishek
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2015, 2015, 8956 : 278 - 287
  • [47] UNCONDITIONALLY SECURE FAIR (t, n)-SECRET SHARING SCHEME
    Al Mahmoud, Qassim
    Besoul, Khaldoun
    Alhalaybeh, Ayman
    ADVANCES AND APPLICATIONS IN DISCRETE MATHEMATICS, 2023, 38 (01): : 127 - 143
  • [48] A secure and efficient secret sharing scheme with general access structures
    Pang, Liao-Jun
    Li, Hui-Xian
    Wang, Yu-Min
    FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PROCEEDINGS, 2006, 4223 : 646 - 649
  • [49] Unconditionally secure proactive secret sharing scheme with combinatorial structures
    Stinson, DR
    Wei, R
    SELECTED AREAS IN CRYPTOGRAPHY, PROCEEDINGS, 2000, 1758 : 200 - 214
  • [50] Cheating prevention in linear secret sharing
    Pieprzyk, J
    Zhang, XM
    INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 121 - 135