A New Verifiable Multi-secret Sharing Scheme Realizing Adversary Structure

被引:10
|
作者
Dehkordi, Masoud Hadian [1 ]
Farzaneh, Yousof [1 ]
机构
[1] Iran Univ Sci & Technol, Sch Math, Tehran, Iran
关键词
Secret sharing; Access structure; Adversary structure; One-way hash function; ONE-WAY FUNCTION;
D O I
10.1007/s11277-015-2310-9
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In some practical applications of secret sharing schemes, such as Byzantine Quorum systems and secure multi-party protocols, the adversary can corrupt subsets of participants at the same time and exploits their shares to recover the secret. In these applications, the system can be described directly by corruptible subsets of participants (so-called adversary structure). A secret sharing scheme realizing adversary structure is a tool for these applications. It is a method of sharing a secret among a finite set of participants in such a way that only certain pre-specified subsets of participants cannot recover the secret. In this paper, we propose a verifiable multi-secret sharing scheme based on one-way hash function that realizes adversary structure, in which each participant has only one reusable shadow. In this scheme, the participant set and the adversary structure can be changed without refreshing any participant's secret shadow and new secrets can be shared. The security of the proposed scheme is based on the properties of the one-way hash function. Our scheme has the advantages of better verifiability and fewer shadows preserves by every participant respect to other schemes realizing adversary structures.
引用
收藏
页码:1749 / 1758
页数:10
相关论文
共 50 条
  • [1] A New Verifiable Multi-secret Sharing Scheme Realizing Adversary Structure
    Masoud Hadian Dehkordi
    Yousof Farzaneh
    [J]. Wireless Personal Communications, 2015, 82 : 1749 - 1758
  • [2] A (k,t,n) verifiable multi-secret sharing scheme based on adversary structure
    Li, Jing
    Wang, Licheng
    Yan, Jianhua
    Niu, Xinxin
    Yang, Yixian
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (12): : 4552 - 4567
  • [3] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    [J]. INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138
  • [4] A verifiable multi-secret sharing scheme (VMSS)
    Pang Liaojun
    Li Huixian
    Jiao Licheng
    Wang Yumin
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 749 - +
  • [5] Verifiable Rational Multi-secret Sharing Scheme
    Cai, Yongquan
    Luo, Zhanhai
    Yang, Yi
    [J]. INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 : 42 - 48
  • [6] A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure
    Alam, Irfan
    Alali, Amal S.
    Ali, Shakir
    Asri, Muhammad S. M.
    [J]. AXIOMS, 2024, 13 (08)
  • [7] On Novel Verifiable Multi-Secret Sharing Scheme
    Wang, Jian
    Liu, Yanheng
    Wang, Yanxi
    [J]. ADVANCED SCIENCE LETTERS, 2011, 4 (11-12) : 3709 - 3715
  • [8] A practical verifiable multi-secret sharing scheme
    Zhao, Jianjie
    Zhang, Jianzhong
    Zhao, Rong
    [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) : 138 - 141
  • [9] A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps
    Ziba Eslami
    Saideh Kabiri Rad
    [J]. Wireless Personal Communications, 2012, 63 : 459 - 467
  • [10] A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps
    Eslami, Ziba
    Rad, Saideh Kabiri
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2012, 63 (02) : 459 - 467