AN EFFICIENT PUBLICLY VERIFIABLE AND PROACTIVE SECRET SHARING SCHEME

被引:0
|
作者
Bagherpour, Bagher [1 ]
机构
[1] Malek Ashtar Univ Technol MUT, Fac Sci Appl, Res Ctr Sci & Technol Appl Math & Cryptog, Esfahan, Iran
关键词
Cryptography; Secret sharing; Proactive secret sharing; Publicly Verifiable secret sharing; Homogeneous linear recursions;
D O I
10.3934/amc.2022086
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A verifiable proactive secret sharing (VPSS) scheme is a verifiable secret sharing scheme with the property that the shareholders can renew their shares without reconstructing the secret and interacting with the dealer. In this paper, we propose a new VPSS scheme using homogeneous linear recursions and prove its security in a standard model. Our scheme is more efficient than the previous VPSS schemes and is secure against mobile and active adversaries. Furthermore, anyone, not only the shareholders of the scheme, can verify the correctness of the produced shares and sub-shares without observing them and interacting with the dealer and shareholders.
引用
收藏
页码:671 / 691
页数:21
相关论文
共 50 条
  • [31] An efficient publicly verifiable multisecret sharing mechanism
    Chang, Chin-Chen
    Chen, Ya-Ping
    [J]. Proceedings of the First International Conference on Information and Management Sciences, 2002, 1 : 150 - 155
  • [32] Efficient Proactive Secret Sharing
    Brendel, Jacqueline
    Demirel, Denise
    [J]. 2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [33] Publicly verifiable secret sharing schemes using bilinear pairings
    Tian, Youliang
    Peng, Changgen
    Ma, Jianfeng
    [J]. International Journal of Network Security, 2012, 14 (03) : 142 - 148
  • [34] Critical survey of existing publicly verifiable secret sharing schemes
    Peng, K.
    [J]. IET INFORMATION SECURITY, 2012, 6 (04) : 249 - 257
  • [35] Optimistic fair exchange based on publicly verifiable secret sharing
    Avoine, G
    Vaudenay, S
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 74 - 85
  • [36] Improvement of Communication Traffic and Security of Proactive Secret Sharing Schemes and Combination Proactive Secret Sharing Scheme with an Asymmetric Secret Sharing Scheme
    Kaneko, Naoto
    Iwamura, Keiichi
    [J]. 2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017), 2017, : 13 - 18
  • [37] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    [J]. INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138
  • [38] A quantum secret sharing scheme with verifiable function
    Li-Juan Liu
    Zhi-Hui Li
    Zhao-Wei Han
    Dan-Li Zhi
    [J]. The European Physical Journal D, 2020, 74
  • [39] Design and analysis of a verifiable secret sharing scheme
    Li, Hui-Xian
    Cai, Wan-Dong
    Pei, Qing-Qi
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2008, 35 (01): : 148 - 151
  • [40] A Secure Verifiable Scheme for Secret Image Sharing
    Rose, Angel A.
    Thampi, Sabu M.
    [J]. SECOND INTERNATIONAL SYMPOSIUM ON COMPUTER VISION AND THE INTERNET (VISIONNET'15), 2015, 58 : 140 - 150