Verifiable Rational Multi-secret Sharing Scheme

被引:0
|
作者
Cai, Yongquan [1 ]
Luo, Zhanhai [1 ]
Yang, Yi [1 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci & Technol, Beijing 100022, Peoples R China
关键词
secret sharing; verifiable; bit commitment; rational; multi-secret;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we mainly focus on the cheating problem and the incapability problem existed in rational secret sharing schemes. Based on current schemes and the related knowledge of bit commitment agreement, we proposed a verifiable rational multi-secret sharing scheme in which players can verify the identity of the dealer. In this way, it is feasible to prevent the forger from cheating. The correctness of the secret share is also guaranteed by discrete logarithm problem. The secret shares are divided into groups so that the distribution phase is well designed. The game theory model is also adopted to realize the rational multi secret sharing. The efficient of our scheme has remarkably improved in this protocol as well as the security and feasibility.
引用
收藏
页码:42 / 48
页数:7
相关论文
共 50 条
  • [1] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    [J]. INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138
  • [2] A verifiable multi-secret sharing scheme (VMSS)
    Pang Liaojun
    Li Huixian
    Jiao Licheng
    Wang Yumin
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 749 - +
  • [3] A practical verifiable multi-secret sharing scheme
    Zhao, Jianjie
    Zhang, Jianzhong
    Zhao, Rong
    [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) : 138 - 141
  • [4] On Novel Verifiable Multi-Secret Sharing Scheme
    Wang, Jian
    Liu, Yanheng
    Wang, Yanxi
    [J]. ADVANCED SCIENCE LETTERS, 2011, 4 (11-12) : 3709 - 3715
  • [5] A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction
    Lin, Changlu
    Hu, Huidan
    Chang, Chin-Chen
    Tang, Shaohua
    [J]. IEEE ACCESS, 2018, 6 : 70666 - 70673
  • [6] A verifiable multi-secret sharing scheme based on cellular automata
    Eslami, Z.
    Ahmadabadi, J. Zarepour
    [J]. INFORMATION SCIENCES, 2010, 180 (15) : 2889 - 2894
  • [7] A Verifiable Multi-Secret Sharing Scheme with Elliptic Curve Cryptography
    Chattopadhyay, Arup Kumar
    Maitra, Paramita
    Nag, Amitava
    Saha, Himadri Nath
    [J]. 2018 IEEE 9TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2018, : 1374 - 1379
  • [8] A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure
    Alam, Irfan
    Alali, Amal S.
    Ali, Shakir
    Asri, Muhammad S. M.
    [J]. AXIOMS, 2024, 13 (08)
  • [9] Publicly verifiable multi-secret sharing scheme from bilinear pairings
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    [J]. IET INFORMATION SECURITY, 2013, 7 (03) : 239 - 246
  • [10] Verifiable multi-secret sharing scheme based on S-multiplication
    He, MX
    Fan, PZ
    Kaderali, F
    [J]. WAVELET ANALYSIS AND ITS APPLICATIONS, AND ACTIVE MEDIA TECHNOLOGY, VOLS 1 AND 2, 2004, : 602 - 608