Verifiable Rational Multi-secret Sharing Scheme

被引:0
|
作者
Cai, Yongquan [1 ]
Luo, Zhanhai [1 ]
Yang, Yi [1 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci & Technol, Beijing 100022, Peoples R China
关键词
secret sharing; verifiable; bit commitment; rational; multi-secret;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we mainly focus on the cheating problem and the incapability problem existed in rational secret sharing schemes. Based on current schemes and the related knowledge of bit commitment agreement, we proposed a verifiable rational multi-secret sharing scheme in which players can verify the identity of the dealer. In this way, it is feasible to prevent the forger from cheating. The correctness of the secret share is also guaranteed by discrete logarithm problem. The secret shares are divided into groups so that the distribution phase is well designed. The game theory model is also adopted to realize the rational multi secret sharing. The efficient of our scheme has remarkably improved in this protocol as well as the security and feasibility.
引用
收藏
页码:42 / 48
页数:7
相关论文
共 50 条
  • [41] A Cellular Automata Based Verifiable Multi-secret Sharing Scheme Without a Trusted Dealer
    Li Meng
    Yu Jia
    Hao Rong
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2017, 26 (02) : 313 - 318
  • [42] How to construct a verifiable multi-secret sharing scheme based on graded encoding schemes
    Dehkordi, Massoud Hadian
    Oraei, Hossein
    [J]. IET INFORMATION SECURITY, 2019, 13 (04) : 343 - 351
  • [43] A verifiable multi-secret image sharing scheme using XOR operation and hash function
    Arup Kumar Chattopadhyay
    Amitava Nag
    Jyoti Prakash Singh
    Amit Kumar Singh
    [J]. Multimedia Tools and Applications, 2021, 80 : 35051 - 35080
  • [44] ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism
    Shi, Ruonan
    Chen, Yuling
    Tan, Chaoyue
    Luo, Yun
    Li, Tao
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):
  • [45] ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism
    Ruonan Shi
    Yuling Chen
    Chaoyue Tan
    Yun Luo
    Tao Li
    [J]. Journal of Cloud Computing, 12
  • [46] Verifiable Rational Secret Sharing Scheme in Mobile Networks
    Zhang, En
    Yuan, Peiyan
    Du, Jiao
    [J]. MOBILE INFORMATION SYSTEMS, 2015, 2015
  • [47] An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme
    Chang, TY
    Hwang, MS
    Yang, WP
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 163 (01) : 169 - 178
  • [48] New efficient and practical verifiable multi-secret sharing schemes
    Dehkordi, Massoud Hadian
    Mashhadi, Samaneh
    [J]. INFORMATION SCIENCES, 2008, 178 (09) : 2262 - 2274
  • [49] A Verifiable (k,n,m)-Threshold Multi-secret Sharing Scheme Based on NTRU Cryptosystem
    Amroudi, Ali Nakhaei
    Zaghain, Ali
    Sajadieh, Mahdi
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) : 1393 - 1405
  • [50] Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme
    Wang, Na
    Cai, Yuanyuan
    Fu, Junsong
    Chen, Xiqi
    [J]. IEEE ACCESS, 2020, 8 : 20799 - 20804