An on-line secret sharing scheme for multi-secrets

被引:63
|
作者
Hwang, RJ
Chang, CC [1 ]
机构
[1] Natl Chung Cheng Univ, Inst Comp Sci & Informat Engn, Chiayi 621, Taiwan
[2] Natl Chung Cheng Inst Technol, Dept Comp Sci & Informat Engn, Tao Yuan 335, Taiwan
关键词
cryptography; information security; RSA cryptosystem; secret sharing scheme; Shamir's; (r; n)-threshold scheme;
D O I
10.1016/S0140-3664(98)00191-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An efficient, computationally secure on-line secret sharing scheme is proposed in this paper. It provides great capabilities for many practical applications. In this scheme, each participant shares many secrets with other participants by holding only one shadow. The shadows are as short as the shared secret. They are selected by the participants themselves. Each participant is allowed to check whether another participant provides the true information or not in the recovery phase. The shadows do not need to be changed when the shared secret is renewed, the access structure is altered, and/or old participants are deleted or new participants are added. The security of our scheme is the same as that of the RSA cryptosystem and Shamir's (r,n)-threshold scheme. (C) 1998 Elsevier Science B.V.
引用
收藏
页码:1170 / 1176
页数:7
相关论文
共 50 条
  • [21] SECURITY OF AUDIO SECRET SHARING SCHEME ENCRYPTING AUDIO SECRETS WITH BOUNDED SHARES
    Washio, Shinya
    Watanabe, Yodai
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2014,
  • [22] A novel visual secret sharing scheme for multiple secrets without pixel expansion
    Lin, Tsung-Lieh
    Horng, Shi-Jinn
    Lee, Kai-Hui
    Chiu, Pei-Ling
    Kao, Tzong-Wann
    Chen, Yuan-Hsin
    Run, Ray-Shine
    Lai, Jui-Lin
    Chen, Rong-Jian
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (12) : 7858 - 7869
  • [23] Visual secret sharing for multiple secrets
    Feng, Jen-Bang
    Wu, Hsien-Chu
    Tsai, Chwei-Shyong
    Chang, Ya-Fen
    Chu, Yen-Ping
    [J]. PATTERN RECOGNITION, 2008, 41 (12) : 3572 - 3581
  • [24] Proactive Secret Sharing Scheme Suitable for Asymmetric Secret Sharing Scheme
    Kaneko, Naoto
    Iwamura, Keiichi
    [J]. 2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS, 2016,
  • [25] Multi secret sharing scheme using iterative method
    Mishra, Abhishek
    Gupta, Ashutosh
    [J]. JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2018, 39 (03): : 631 - 641
  • [26] Verifiable Rational Multi-secret Sharing Scheme
    Cai, Yongquan
    Luo, Zhanhai
    Yang, Yi
    [J]. INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 : 42 - 48
  • [27] A practical verifiable multi-secret sharing scheme
    Zhao, Jianjie
    Zhang, Jianzhong
    Zhao, Rong
    [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) : 138 - 141
  • [28] Verifiable threshold multi-secret sharing scheme
    Pang, Liao-Jun
    Li, Hui-Xian
    Li, Zhi-Jie
    Wang, Yu-Min
    [J]. Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2008, 40 (09): : 1462 - 1465
  • [29] A Hierarchical Threshold Multi-secret Sharing Scheme
    Shi Runhua
    Zhong Hong
    [J]. 2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 231 - 234
  • [30] A (t, n) multi-secret sharing scheme
    Yang, CC
    Chang, TY
    Hwang, MS
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2004, 151 (02) : 483 - 490