A New Verifiable Multi-secret Sharing Scheme Realizing Adversary Structure

被引:10
|
作者
Dehkordi, Masoud Hadian [1 ]
Farzaneh, Yousof [1 ]
机构
[1] Iran Univ Sci & Technol, Sch Math, Tehran, Iran
关键词
Secret sharing; Access structure; Adversary structure; One-way hash function; ONE-WAY FUNCTION;
D O I
10.1007/s11277-015-2310-9
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In some practical applications of secret sharing schemes, such as Byzantine Quorum systems and secure multi-party protocols, the adversary can corrupt subsets of participants at the same time and exploits their shares to recover the secret. In these applications, the system can be described directly by corruptible subsets of participants (so-called adversary structure). A secret sharing scheme realizing adversary structure is a tool for these applications. It is a method of sharing a secret among a finite set of participants in such a way that only certain pre-specified subsets of participants cannot recover the secret. In this paper, we propose a verifiable multi-secret sharing scheme based on one-way hash function that realizes adversary structure, in which each participant has only one reusable shadow. In this scheme, the participant set and the adversary structure can be changed without refreshing any participant's secret shadow and new secrets can be shared. The security of the proposed scheme is based on the properties of the one-way hash function. Our scheme has the advantages of better verifiability and fewer shadows preserves by every participant respect to other schemes realizing adversary structures.
引用
收藏
页码:1749 / 1758
页数:10
相关论文
共 50 条
  • [31] Dynamic and verifiable threshold multi-secret sharing scheme based on bilinear pairings
    Li, Huina
    [J]. ICIC Express Letters, 2015, 9 (10): : 2819 - 2825
  • [32] A Verifiable Multi-Secret Sharing Scheme Based on ℓ-Intersection Pair of Cyclic Codes
    Hossain, Md Ajaharul
    Bandi, Ramakrishna
    [J]. INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2023,
  • [33] A secure and efficient (t, n) threshold verifiable multi-secret sharing scheme
    Huang, MJ
    Zhang, JZ
    Xie, SC
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 532 - 537
  • [34] Verifiable Threshold Scheme in Multi-Secret Sharing Distributions upon Extensions of ECC
    Wang, Shiuh-Jeng
    Tsai, Yuh-Ren
    Shen, Chien-Chih
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2011, 56 (01) : 173 - 182
  • [35] A New Double Layer Multi-Secret Sharing Scheme
    Elavarasi Gunasekaran
    Vanitha Muthuraman
    [J]. China Communications, 2024, 21 (01) : 297 - 309
  • [36] A New (t, n) Multi-secret Sharing Scheme
    Tan, Xiao-qing
    Wang, Zhi-guo
    [J]. ICCEE 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, 2008, : 861 - +
  • [37] Verifiable multi-secret sharing based on LFSR sequences
    Hu, Chunqiang
    Liao, Xiaofeng
    Cheng, Xiuzhen
    [J]. THEORETICAL COMPUTER SCIENCE, 2012, 445 : 52 - 62
  • [38] A new double layer multi-secret sharing scheme
    Gunasekaran, Elavarasi
    Muthuraman, Vanitha
    [J]. CHINA COMMUNICATIONS, 2024, 21 (01) : 287 - 309
  • [39] Design and Analysis of a New Multi-secret Sharing Scheme
    Liu Feng
    Gao Dong-Mei
    [J]. 2009 ETP INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATION (FCC 2009), 2009, : 241 - 243
  • [40] A new multi-secret sharing scheme with multi-policy
    Geng Yong-Jun
    Fan Xiao-Hong
    Hong Fan
    [J]. 9th International Conference on Advanced Communication Technology: Toward Network Innovation Beyond Evolution, Vols 1-3, 2007, : 1515 - 1517