Computationally Secure Verifiable Secret Sharing Scheme for Distributing Many Secrets

被引:2
|
作者
Ogata, Wakaha [1 ]
Araki, Toshinori [2 ]
机构
[1] Tokyo Inst Technol, Tokyo 1528552, Japan
[2] NEC Corp Ltd, Kawasaki, Kanagawa 2118666, Japan
关键词
secret sharing; multi-secret sharing; on-line secret sharing; verifiable secret sharing; computational security; EFFICIENT;
D O I
10.1587/transfun.E100.A.103
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many researchers studied computationally-secure (verifiable) secret sharing schemes which distribute multiple secrets with a bulletin board. However, the security definition is ambiguous in many of the past articles. In this paper, we first review existing schemes based on formal definitions of indistinguishability of secrets, verifiability of consistency, and cheater-detectability. And then, we propose a new secret sharing scheme which is the first scheme with indistinguishability of secrets, verifiability, and cheater-detectability, and allows to share secrets with arbitrary access structures. Further, our scheme is provably secure under well known computational assumptions.
引用
收藏
页码:103 / 114
页数:12
相关论文
共 50 条
  • [1] A Secure Verifiable Scheme for Secret Image Sharing
    Rose, Angel A.
    Thampi, Sabu M.
    [J]. SECOND INTERNATIONAL SYMPOSIUM ON COMPUTER VISION AND THE INTERNET (VISIONNET'15), 2015, 58 : 140 - 150
  • [2] Secure and verifiable vector space secret sharing scheme
    Xiao, QH
    Ping, LD
    Pan, XZ
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOL 2, 2004, : 689 - 693
  • [3] Secure electronic voting using Publicly Verifiable Secret Sharing scheme
    Song, Chun-lai
    Yin, Xin-chun
    [J]. 2005 International Symposium on Computer Science and Technology, Proceedings, 2005, : 627 - 630
  • [4] Computationally Secure Secret Image Sharing
    Ahmadian, Amir M.
    Amirmazlaghani, Maryam
    [J]. 2017 25TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2017, : 2217 - 2222
  • [5] A (n, t, n) Verifiable Multi-secret Sharing Scheme with Secure Secret Reconstruction
    Meng, Li
    Qu Shaoyun
    Xun Tiantian
    Jia, Yu
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 191 - 204
  • [6] A practical and provably secure scheme for publicly verifiable secret sharing and its applications
    Fujisaki, E
    Okamoto, T
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 32 - 46
  • [7] Secure Verifiable Secret Short Sharing Scheme for Multi-Cloud Storage
    Deryabin, Maxim
    Chervyakov, Nikolay
    Tchernykh, Andrei
    Babenko, Mikhail
    Kucherov, Nikolay
    Miranda-Lopez, Vanessa
    Avetisyan, Arutyun
    [J]. PROCEEDINGS 2018 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2018, : 700 - 706
  • [8] Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme
    Chen, Liqun
    Laing, Thalia M.
    Martin, Keith M.
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2017, 2017, 10239 : 40 - 57
  • [9] A secure and efficient (t, n) threshold verifiable multi-secret sharing scheme
    Huang, MJ
    Zhang, JZ
    Xie, SC
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 532 - 537
  • [10] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    [J]. INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138