Secret sharing schemes with cheating detection

被引:0
|
作者
Horng, G [1 ]
机构
[1] Natl Chung Hsing Univ, Inst Comp Sci, Taichung 40227, Taiwan
关键词
secret sharing; cheating detection; access structure; threshold scheme; multiple assignment scheme;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A secret sharing scheme allows a secret to be shared among a set of participants, P, such that only authorized subsets of P can recover the secret, but any unauthorized subset can not recover the secret. It can be used to protect important secret data, such as cryptographic keys, from being lost or destroyed without accidental or malicious exposure. In this paper, we consider secret sharing schemes based on interpolating polynomials. We show that, by simply increasing the number of shares held by each participant, there is a multiple assignment scheme for any monotone access structure such that cheating can be detected with very high probability by any honest participant even the cheaters form a coalition in order to deceive him.
引用
收藏
页码:845 / 850
页数:6
相关论文
共 50 条
  • [21] Strictly cheating immune secret sharing
    Zhang, J
    Wen, QY
    [J]. ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 514 - 519
  • [22] (k,n) secret image sharing scheme capable of cheating detection
    Yan-Xiao Liu
    Qin-Dong Sun
    Ching-Nung Yang
    [J]. EURASIP Journal on Wireless Communications and Networking, 2018
  • [23] Cheating prevention in linear secret sharing
    Pieprzyk, J
    Zhang, XM
    [J]. INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 121 - 135
  • [24] (k, n) secret image sharing scheme capable of cheating detection
    Liu, Yan-Xiao
    Sun, Qin-Dong
    Yang, Ching-Nung
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
  • [25] Cheating detection and cheater identification in (t, n) secret sharing scheme
    Wang, Zhixiao
    Liu, Yanxiao
    Yan, Wenyao
    Wei, Wei
    Li, Junhuai
    Zhang, Deyun
    Alfandi, Omar
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2014, 29 (01): : 87 - 93
  • [26] On secret sharing schemes
    Blundo, C
    De Santis, A
    Vaccaro, U
    [J]. INFORMATION PROCESSING LETTERS, 1998, 65 (01) : 25 - 32
  • [27] Detection of Cheaters in Vector Space Secret Sharing Schemes
    Carles Padro
    Germán Sáez
    Jorge Luis Villar
    [J]. Designs, Codes and Cryptography, 1999, 16 : 75 - 85
  • [28] Cyber Attack Detection using Secret Sharing Schemes
    Chum, Chi Sing
    Wei, Xinzhou
    Zhang, Xiaowen
    [J]. 2023 IEEE 9TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD, BIGDATASECURITY, IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, HPSC AND IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY, IDS, 2023, : 57 - 59
  • [29] Detection of cheaters in vector space secret sharing schemes
    Padró, C
    Sáez, G
    Villar, JL
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 1999, 16 (01) : 75 - 85
  • [30] On secret reconstruction in secret sharing schemes
    Wang, Huaxiong
    Wong, Duncan S.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (01) : 473 - 480