Secret sharing schemes with cheating detection

被引:0
|
作者
Horng, G [1 ]
机构
[1] Natl Chung Hsing Univ, Inst Comp Sci, Taichung 40227, Taiwan
关键词
secret sharing; cheating detection; access structure; threshold scheme; multiple assignment scheme;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A secret sharing scheme allows a secret to be shared among a set of participants, P, such that only authorized subsets of P can recover the secret, but any unauthorized subset can not recover the secret. It can be used to protect important secret data, such as cryptographic keys, from being lost or destroyed without accidental or malicious exposure. In this paper, we consider secret sharing schemes based on interpolating polynomials. We show that, by simply increasing the number of shares held by each participant, there is a multiple assignment scheme for any monotone access structure such that cheating can be detected with very high probability by any honest participant even the cheaters form a coalition in order to deceive him.
引用
收藏
页码:845 / 850
页数:6
相关论文
共 50 条
  • [41] Further Results of Cheating Immune Secret Sharing
    ZHANG Jie~(1
    2.State Key Laboratory of Information Security
    [J]. The Journal of China Universities of Posts and Telecommunications, 2004, (04) : 26 - 28
  • [42] Detecting dealer cheating in secret sharing systems
    Chang, CC
    Chan, CW
    [J]. 24TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COSPSAC 2000), 2000, 24 : 449 - 453
  • [43] Secret sharing schemes with detection of cheaters for a general access structure
    Cabello, S
    Padró, C
    Sáez, G
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2002, 25 (02) : 175 - 188
  • [44] Secret sharing schemes with detection of cheaters for a general access structure
    Cabello, S
    Padró, C
    Sáez, G
    [J]. FUNDAMENTALS OF COMPUTATION THEORY, 1999, 1684 : 185 - 194
  • [45] Secret Sharing Schemes with Detection of Cheaters for a General Access Structure
    Sergio Cabello
    Carles Padró
    Germán Sáez
    [J]. Designs, Codes and Cryptography, 2002, 25 : 175 - 188
  • [46] On identification secret sharing schemes
    Cai, N
    Lam, KY
    [J]. INFORMATION AND COMPUTATION, 2003, 184 (02) : 298 - 310
  • [47] On Proactive Secret Sharing Schemes
    Nikov, V
    Nikova, S
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 308 - 325
  • [48] PERFECT SECRET SHARING SCHEMES
    Parvatov, K. G.
    [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2008, 2 (02): : 50 - 57
  • [49] Secret sharing schemes on graphs
    Csirmaz, Laszlo
    [J]. STUDIA SCIENTIARUM MATHEMATICARUM HUNGARICA, 2007, 44 (03) : 297 - 306
  • [50] Partial Secret Sharing Schemes
    Jafari, Amir
    Khazaei, Shahram
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (08) : 5364 - 5385