Fair (t, n) threshold secret sharing scheme

被引:19
|
作者
Tian, Youliang [1 ,2 ]
Ma, Jianfeng [2 ]
Peng, Changgen [1 ]
Jiang, Qi [2 ]
机构
[1] Guizhou Univ, Coll Sci, Guiyang 550025, Peoples R China
[2] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1049/iet-ifs.2012.0064
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the setting of secret sharing, a group of parties wish to run a protocol for recovering the secret when they input their shares. The security requirement include privacy, correctness and others. One desirable property is fairness, which guarantees that if either party gets the secret, then the other party does too. However, basic secret sharing schemes, verifiable secret sharing schemes and publicly verifiable secret sharing schemes do not satisfy the fairness. Moreover, fairness is a central objective of the rational secret sharing scheme. In this work, the authors study the fairness problem of secret reconstruction in a (t, n) secret sharing scheme. They use a new approach to achieve the fairness of the protocol. They first define the fair notion of secret sharing probabilistically. Using the definition, a fair (t, n) secret sharing scheme is proposed, its security and fairness are shown against three different attack types. The proposed scheme is an extension of basic model of secret sharing (Shamir's scheme) and the approach of fairness of Dov Gordon et al.(STOC2008). Theoretical analysis shows that the proposed scheme is more efficient.
引用
收藏
页码:106 / 112
页数:7
相关论文
共 50 条
  • [1] A Fair (t,n) Threshold Secret Sharing Scheme
    Xing, Minhong
    Li, Wenmin
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENT COMMUNICATION, 2015, 16 : 140 - 143
  • [2] Comments on 'Fair (t, n) threshold secret sharing scheme'
    Harn, Lein
    [J]. IET INFORMATION SECURITY, 2014, 8 (06) : 303 - 304
  • [3] A (t, n)-FAIR DYNAMIC THRESHOLD SECRET SHARING SCHEME
    Lin, Tzuoh-Yi
    Wu, Tzong-Chen
    Lee, Chin-I
    Wu, Tzong-Sun
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (05): : 1395 - 1406
  • [4] A New (t, n)-Threshold Secret Sharing Scheme
    Tang, Chunming
    Yao, Zheng-an
    [J]. 2008 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING, 2008, : 920 - +
  • [5] A scheme for (t, n) threshold secret image sharing
    Chan, Chao-Wen
    Chang, Thin-Chen
    [J]. IMECS 2006: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, 2006, : 619 - +
  • [6] UNCONDITIONALLY SECURE FAIR (t, n)-SECRET SHARING SCHEME
    Al Mahmoud, Qassim
    Besoul, Khaldoun
    Alhalaybeh, Ayman
    [J]. ADVANCES AND APPLICATIONS IN DISCRETE MATHEMATICS, 2023, 38 (01): : 127 - 143
  • [7] An efficient (t,n)-threshold secret image sharing scheme
    Kanso, Ali
    Ghebleh, Mohammad
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (15) : 16369 - 16388
  • [8] AN EFFICIENT AND SECURE (t, n) THRESHOLD SECRET SHARING SCHEME
    Pang Liaojun Sun Xi Wang Yumin (The National Key Lab of Integrated Service Networks
    [J]. Journal of Electronics(China), 2006, (05) : 731 - 735
  • [9] AN EFFICIENT AND SECURE (t, n) THRESHOLD SECRET SHARING SCHEME
    Pang Liaojun Sun Xi Wang Yumin The National Key Lab of Integrated Service Networks Xidian Univ Xian China
    [J]. JournalofElectronics., 2006, (05) - 735
  • [10] A (t, n) Threshold Quantum Secret Sharing Scheme with Fairness
    Fulin Li
    Tingyan Chen
    Shixin Zhu
    [J]. International Journal of Theoretical Physics, 62