A Verifiable Multi-Secret Sharing Scheme with Elliptic Curve Cryptography

被引:0
|
作者
Chattopadhyay, Arup Kumar [1 ]
Maitra, Paramita [1 ]
Nag, Amitava [2 ]
Saha, Himadri Nath [1 ]
机构
[1] Inst Engn & Management, Kolkata, W Bengal, India
[2] Cent Inst Technol, Kokrajhar, Assam, India
关键词
MSS; elliptic curve cryptography; ECDH; verifiable; hash function; EFFICIENT;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In a multi-secret sharing scheme (MSS) more than one secrets are shared among a set of authorized participants on a public channel. A multi-secret sharing scheme is verifiable, if the secrecy of both secrets and shares are maintained such that the participants and the combiner both can verify the correctness of the shares transferred to them and also the correctness of the secrets obtained after executing the reconstruction process of the secret sharing scheme. We propose a verifiable (k, t, n) threshold multi-secret sharing scheme based on MSS proposed by Shao (2014). In a typical (k, t, n) threshold MSS scheme, the dealer shares k secrets among n participants secretly (in encoded way) so that all the k secrets can be revealed if any t or more (<= n) participants submit their shares, whereas none of the secrets can be revealed by any less than t participants. At the same time the shares obtained and secrets reconstructed are verifiable by participants and combiner. We propose to use public channel for distribution process rather than private channel used in Shao's MSS scheme. In the proposed scheme the distribution over public channel is made secure using Elliptic Curve Deffie-Hellman (ECDH) protocol.
引用
收藏
页码:1374 / 1379
页数:6
相关论文
共 50 条
  • [1] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    [J]. INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138
  • [2] A verifiable multi-secret sharing scheme (VMSS)
    Pang Liaojun
    Li Huixian
    Jiao Licheng
    Wang Yumin
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 749 - +
  • [3] Verifiable Rational Multi-secret Sharing Scheme
    Cai, Yongquan
    Luo, Zhanhai
    Yang, Yi
    [J]. INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 : 42 - 48
  • [4] On Novel Verifiable Multi-Secret Sharing Scheme
    Wang, Jian
    Liu, Yanheng
    Wang, Yanxi
    [J]. ADVANCED SCIENCE LETTERS, 2011, 4 (11-12) : 3709 - 3715
  • [5] A practical verifiable multi-secret sharing scheme
    Zhao, Jianjie
    Zhang, Jianzhong
    Zhao, Rong
    [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) : 138 - 141
  • [6] Verifiable threshold multi-secret sharing scheme
    Pang, Liao-Jun
    Li, Hui-Xian
    Li, Zhi-Jie
    Wang, Yu-Min
    [J]. Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2008, 40 (09): : 1462 - 1465
  • [7] A NEW VERIFIABLE MULTI-SECRET SHARING SCHEME BASED ON ELLIPTIC CURVES AND PAIRINGS
    Bahramian, Mojtaba
    Eslami, Khadijeh
    [J]. ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2019, (41): : 456 - 468
  • [8] Multi-secret sharing threshold visual cryptography scheme
    Yu, Bin
    Xu, Xiaohui
    Fang, Liguo
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 815 - +
  • [9] Extended Visual Cryptography Scheme for Multi-secret Sharing
    Reddy, L. Siva
    Prasad, Munaga V. N. K.
    [J]. PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 249 - 257
  • [10] A Modified Multi-secret Sharing Visual Cryptography Scheme
    Yu, Bin
    Fu, Zhengxin
    Fang, Liguo
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 912 - 915