Secure publicly verifiable and proactive secret sharing schemes with general access structure

被引:28
|
作者
Mashhadi, Samaneh [1 ]
机构
[1] Iran Univ Sci & Technol, Dept Math, Tehran 1684613114, Iran
关键词
Publicly verifiable secret sharing; Proactive scheme; Standard model; Bilinear pairing; Monotone span program; Robust;
D O I
10.1016/j.ins.2016.10.040
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A publicly verifiable secret sharing allows anyone to detect the cheating of dealer or participants only from the public information. In this paper, by using bilinear pairings and monotone span programs we propose two practical publicly verifiable secret sharing schemes with general access structure. The first scheme has provable security in the standard model. The other scheme is proactive, robust and secure against mobile attack. These schemes tolerate active and adaptive adversaries and provide great capabilities for many applications. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:99 / 108
页数:10
相关论文
共 50 条
  • [1] On distributed key distribution centers and unconditionally secure proactive verifiable secret sharing schemes based on general access structure
    Nikov, V
    Nikova, S
    Preneel, B
    Vandewalle, J
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS, 2002, 2551 : 422 - 435
  • [2] Verifiable Secret Redistribution for Proactive Secret Sharing Schemes
    于佳
    孔凡玉
    李大兴
    Journal of Shanghai Jiaotong University(Science), 2006, (02) : 236 - 241
  • [4] Publicly verifiable secret sharing schemes using bilinear pairings
    Tian, Youliang
    Peng, Changgen
    Ma, Jianfeng
    International Journal of Network Security, 2012, 14 (03) : 142 - 148
  • [5] Critical survey of existing publicly verifiable secret sharing schemes
    Peng, K.
    IET INFORMATION SECURITY, 2012, 6 (04) : 249 - 257
  • [6] Publicly verifiable secret sharing
    Stadler, M
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 190 - 199
  • [7] Secure electronic voting using Publicly Verifiable Secret Sharing scheme
    Song, Chun-lai
    Yin, Xin-chun
    2005 International Symposium on Computer Science and Technology, Proceedings, 2005, : 627 - 630
  • [8] Efficient publicly verifiable secret sharing schemes with fast or delayed recovery
    Boudot, F
    Traoré, J
    INFORMATION AND COMMUNICATON SECURITY, PROCEEDINGS, 1999, 1726 : 87 - 102
  • [9] Strongly secure ramp secret sharing schemes for general access structures
    Iwamoto, M
    Yamamoto, H
    INFORMATION PROCESSING LETTERS, 2006, 97 (02) : 52 - 57
  • [10] Publicly verifiable function secret sharing
    Wang, Qiang
    Zhou, Fucai
    Peng, Su
    Xu, Jian
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2019, 20 (04) : 526 - 535