Computationally Secure Verifiable Secret Sharing Scheme for Distributing Many Secrets

被引:2
|
作者
Ogata, Wakaha [1 ]
Araki, Toshinori [2 ]
机构
[1] Tokyo Inst Technol, Tokyo 1528552, Japan
[2] NEC Corp Ltd, Kawasaki, Kanagawa 2118666, Japan
关键词
secret sharing; multi-secret sharing; on-line secret sharing; verifiable secret sharing; computational security; EFFICIENT;
D O I
10.1587/transfun.E100.A.103
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many researchers studied computationally-secure (verifiable) secret sharing schemes which distribute multiple secrets with a bulletin board. However, the security definition is ambiguous in many of the past articles. In this paper, we first review existing schemes based on formal definitions of indistinguishability of secrets, verifiability of consistency, and cheater-detectability. And then, we propose a new secret sharing scheme which is the first scheme with indistinguishability of secrets, verifiability, and cheater-detectability, and allows to share secrets with arbitrary access structures. Further, our scheme is provably secure under well known computational assumptions.
引用
收藏
页码:103 / 114
页数:12
相关论文
共 50 条
  • [31] Verifiable Rational Secret Sharing Scheme in Mobile Networks
    Zhang, En
    Yuan, Peiyan
    Du, Jiao
    [J]. MOBILE INFORMATION SYSTEMS, 2015, 2015
  • [32] A verifiable multi-secret sharing scheme (VMSS)
    Pang Liaojun
    Li Huixian
    Jiao Licheng
    Wang Yumin
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 749 - +
  • [33] Proactive Verifiable Linear Integer Secret Sharing Scheme
    Ma, Chuangui
    Ding, Xiaofei
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2009, 5927 : 439 - 448
  • [34] A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets
    Liu, Yanjun
    Harn, Lein
    Chang, Chin-Chen
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (07) : 1282 - 1292
  • [35] NONINTERACTIVE AND INFORMATION-THEORETIC SECURE VERIFIABLE SECRET SHARING
    PEDERSEN, TP
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1992, 576 : 129 - 140
  • [36] INFORMATION-THEORETICALLY SECURE STRONG VERIFIABLE SECRET SHARING
    Lin, Changlu
    Harn, Lein
    Ye, Dingfeng
    [J]. SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 233 - +
  • [37] Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
    Dowsley, Rafael
    Mueller-Quade, Joern
    Otsuka, Akira
    Hanaoka, Goichiro
    Imai, Hideki
    Nascimento, Anderson C. A.
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (02) : 725 - 734
  • [38] Provably secure verifiable multi-stage secret sharing scheme based on monotone span program
    Mashhadi, Samaneh
    Dehkordi, Massoud Hadian
    Kiamari, Niloofar
    [J]. IET INFORMATION SECURITY, 2017, 11 (06) : 326 - 331
  • [39] A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction
    Lin, Changlu
    Hu, Huidan
    Chang, Chin-Chen
    Tang, Shaohua
    [J]. IEEE ACCESS, 2018, 6 : 70666 - 70673
  • [40] A Visual Secret Sharing Scheme for Progressively Restoring Secrets
    Chin-Chen Chang
    Yi-Pei Hsieh
    [J]. Journal of Electronic Science and Technology, 2011, 9 (04) : 325 - 331