Efficient (k,n)Threshold secret sharing schemes secure against cheating from n-1 cheaters

被引:0
|
作者
Araki, Toshinori
机构
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In (k, n) threshold secret sharing scheme, Tompa and Well consider a problem of cheaters who try to make another participant reconstruct invalid secret. Later, the model of such cheating is formalized in some researches. Some schemes secure against cheating of these models are proposed. However, in these models, the number of colluding participants is restricted to k - 1 or less. In this paper, we consider k or more colluding participants. Of course, secrecy is not maintained to such participants. However, if considering detecting the fact of cheating, we need to consider a cheating from k or more colluding participants. In this paper, we propose a (k, n) threshold secret sharing scheme that is capable of detecting the fact of cheating from n - 1 or less colluding participants. A scheme proposed by Tompa and Woll can be proven to be a (k, n) threshold secret sharing scheme that is capable of detecting the fact of cheating from n - I or less colluding participants. However, our proposed scheme is much more efficient with respect to the size of shares.
引用
收藏
页码:133 / 142
页数:10
相关论文
共 50 条
  • [1] Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters
    Adhikari, Avishek
    Morozov, Kirill
    Obana, Satoshi
    Roy, Partha Sarathi
    Sakurai, Kouichi
    Xu, Rui
    [J]. INFORMATION THEORETIC SECURITY, ICITS 2016, 2016, 10015 : 3 - 23
  • [2] Efficient (k, n) Secret Sharing Scheme Secure Against k-2 Cheaters
    Zhu, Lei
    Liu, Yanxiao
    Wang, Yichuan
    Ji, Wenjiang
    Hei, Xinhong
    Yao, Quanzhu
    Zhu, Xiaoyan
    [J]. 2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2017, : 1 - 4
  • [3] A (T, N) threshold secret sharing system with efficient identification of cheaters
    Lin, IC
    Chang, CC
    [J]. COMPUTING AND INFORMATICS, 2005, 24 (05) : 529 - 541
  • [4] (k,n) Secret Sharing Scheme against Two Types of Cheaters
    Liu, Yanxiao
    Wang, Yichuan
    Zhu, Lei
    Jiang, Jiwen
    Hei, Xinhong
    [J]. PROCEEDINGS 2016 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS NANA 2016, 2016, : 284 - 287
  • [5] Cheating identifiable (k, n) threshold quantum secret sharing scheme
    Chenhong Yan
    Zhihui Li
    Lu Liu
    Dianjun Lu
    [J]. Quantum Information Processing, 2022, 21
  • [6] Cheating identifiable (k, n) threshold quantum secret sharing scheme
    Yan, Chenhong
    Li, Zhihui
    Liu, Lu
    Lu, Dianjun
    [J]. QUANTUM INFORMATION PROCESSING, 2022, 21 (01)
  • [7] AN EFFICIENT AND SECURE (t, n) THRESHOLD SECRET SHARING SCHEME
    Pang Liaojun Sun Xi Wang Yumin (The National Key Lab of Integrated Service Networks
    [J]. Journal of Electronics(China), 2006, (05) : 731 - 735
  • [8] AN EFFICIENT AND SECURE (t, n) THRESHOLD SECRET SHARING SCHEME
    Pang Liaojun Sun Xi Wang Yumin The National Key Lab of Integrated Service Networks Xidian Univ Xian China
    [J]. Journal of Electronics., 2006, (05) - 735
  • [9] A Simple and Efficient Secret Sharing Scheme Secure against Cheating
    Araki, Toshinori
    Ogata, Wakaha
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (06) : 1338 - 1345
  • [10] Almost optimum secret sharing schemes secure against cheating for arbitrary secret distribution
    Obana, Satoshi
    Araki, Toshinori
    [J]. Advances in Cryptology - ASIACRYPT 2006, 2006, 4284 : 364 - 379