Computationally Secure Verifiable Secret Sharing Scheme for Distributing Many Secrets

被引:2
|
作者
Ogata, Wakaha [1 ]
Araki, Toshinori [2 ]
机构
[1] Tokyo Inst Technol, Tokyo 1528552, Japan
[2] NEC Corp Ltd, Kawasaki, Kanagawa 2118666, Japan
关键词
secret sharing; multi-secret sharing; on-line secret sharing; verifiable secret sharing; computational security; EFFICIENT;
D O I
10.1587/transfun.E100.A.103
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many researchers studied computationally-secure (verifiable) secret sharing schemes which distribute multiple secrets with a bulletin board. However, the security definition is ambiguous in many of the past articles. In this paper, we first review existing schemes based on formal definitions of indistinguishability of secrets, verifiability of consistency, and cheater-detectability. And then, we propose a new secret sharing scheme which is the first scheme with indistinguishability of secrets, verifiability, and cheater-detectability, and allows to share secrets with arbitrary access structures. Further, our scheme is provably secure under well known computational assumptions.
引用
收藏
页码:103 / 114
页数:12
相关论文
共 50 条
  • [41] Strong (n,t,n) verifiable secret sharing scheme
    Harn, Lein
    Lin, Changlu
    [J]. INFORMATION SCIENCES, 2010, 180 (16) : 3059 - 3064
  • [42] VPSS: A verifiable proactive secret sharing scheme in distributed systems
    Pramanik, S
    Upadhyaya, S
    [J]. MILCOM 2003 - 2003 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2003, : 826 - 831
  • [43] A novel verifiable weighted threshold quantum secret sharing scheme
    Dong, Yumin
    Luo, Yi
    Fu, Yanying
    [J]. PHYSICA SCRIPTA, 2023, 98 (06)
  • [44] A novel non-interactive verifiable secret sharing scheme
    Ao, Jun
    Liao, Guisheng
    Ma, Chunbo
    [J]. 2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 1525 - +
  • [45] A verifiable rational secret sharing scheme based on bilinear pairing
    [J]. Zhang, E. (zhangenzdrj@163.com), 1600, Chinese Institute of Electronics (40):
  • [46] A new approach of Secret Image Sharing using Verifiable Scheme
    Rao, Jyoti
    Venny, Priya
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1134 - 1139
  • [47] Verifiable Quantum Secret Sharing Scheme Based on LDPC Codes
    Bai, Chen-Ming
    Feng, Yanan
    Zhang, Sujuan
    Liu, Lu
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2024, 63 (01)
  • [48] Verifiable Quantum Secret Sharing Scheme Based on LDPC Codes
    Chen-Ming Bai
    Yanan Feng
    Sujuan Zhang
    Lu Liu
    [J]. International Journal of Theoretical Physics, 63
  • [49] A verifiable secret sharing scheme with combiner verification and cheater identification
    Kandar, Shyamalendu
    Dhara, Bibhas Chandra
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 51
  • [50] A Verifiable Secret Image Sharing Scheme Based on Compressive Sensing
    LI Xinyan
    XIAO Di
    MOU Huajian
    ZHANG Rui
    [J]. Wuhan University Journal of Natural Sciences, 2018, 23 (03) : 219 - 224