Secret sharing schemes with cheating detection

被引:0
|
作者
Horng, G [1 ]
机构
[1] Natl Chung Hsing Univ, Inst Comp Sci, Taichung 40227, Taiwan
关键词
secret sharing; cheating detection; access structure; threshold scheme; multiple assignment scheme;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A secret sharing scheme allows a secret to be shared among a set of participants, P, such that only authorized subsets of P can recover the secret, but any unauthorized subset can not recover the secret. It can be used to protect important secret data, such as cryptographic keys, from being lost or destroyed without accidental or malicious exposure. In this paper, we consider secret sharing schemes based on interpolating polynomials. We show that, by simply increasing the number of shares held by each participant, there is a multiple assignment scheme for any monotone access structure such that cheating can be detected with very high probability by any honest participant even the cheaters form a coalition in order to deceive him.
引用
收藏
页码:845 / 850
页数:6
相关论文
共 50 条
  • [1] CHEATING DETECTION AND CHEATER IDENTIFICATION IN SECRET SHARING SCHEMES
    WU, TC
    WU, TS
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1995, 142 (05): : 367 - 369
  • [2] Almost Optimum Secret Sharing Schemes with Cheating Detection for Random Bit Strings
    Hoshino, Hidetaka
    Obana, Satoshi
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 213 - 222
  • [3] Outsourced cheating detection for secret sharing
    Louis Cianciullo
    Hossein Ghodosi
    [J]. International Journal of Information Security, 2021, 20 : 871 - 878
  • [4] Outsourced cheating detection for secret sharing
    Cianciullo, Louis
    Ghodosi, Hossein
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (06) : 871 - 878
  • [5] Leakage Resilient Cheating Detectable Secret Sharing Schemes
    Dutta, Sabyasachi
    Safavi-Naini, Reihaneh
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 3 - 23
  • [6] Flaws in some secret sharing schemes against cheating
    Araki, Toshinori
    Obana, Satoshi
    [J]. Information Security and Privacy, Proceedings, 2007, 4586 : 122 - 132
  • [7] Cheating Detectable Secret Sharing Schemes for Random Bit Strings
    Ogata, Wakaha
    Araki, Toshinori
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (11) : 2230 - 2234
  • [8] Almost Optimum Secret Sharing with Cheating Detection
    Jhanwar, Mahabir Prasad
    Safavi-Naini, Reihaneh
    [J]. SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING (SPACE 2015), 2015, 9354 : 359 - 372
  • [9] Secret Sharing Scheme with Efficient Cheating Detection
    Becerra, Daniel
    Vega, Gerardo
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON NETWORKING, INFORMATION SYSTEMS & SECURITY (NISS19), 2019,
  • [10] Properties and constraints of cheating-immune secret sharing schemes
    D'Arco, P
    Kishimoto, W
    Stinson, DR
    [J]. DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 219 - 233