Computationally Secure Robust Multi-secret Sharing for General Access Structure

被引:1
|
作者
Das, Angsuman [1 ]
Roy, Partha Sarathi [2 ]
Adhikari, Avishek [2 ]
机构
[1] St Xaviers Coll, Dept Math, Kolkata, India
[2] Univ Calcutta, Dept Pure Math, Kolkata, India
来源
MATHEMATICS AND COMPUTING | 2015年 / 139卷
关键词
Robust secret sharing; General access structure; Computational security; SCHEME;
D O I
10.1007/978-81-322-2452-5_9
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Secret sharing scheme plays a crucial role in distributed cryptosystems. Due to its extensive use in numerous applications, an important goal in this area is to minimize trust among the participants. To remove this bottleneck, robust secret sharing, which allows the correct secret to be recovered even when some of the shares presented during an attempted reconstruction are incorrect, can be an efficient tool. However, as unconditional security demands honest majority and share size to be at least equal to the size of the secret, the need for computational security of such schemes has been felt over the years, specially in case of multi-secret sharing schemes. In this paper, we provide a notion of computationally robust multi-secret sharing scheme for general access structure. We also propose a robust multi-secret sharing scheme for general access structure and prove its computational security under the proposed notation.
引用
收藏
页码:123 / 134
页数:12
相关论文
共 50 条
  • [1] Computationally Secure Cheating Identifiable Multi-Secret Sharing for General Access Structure
    Roy, Partha Sarathi
    Das, Angsuman
    Adhikari, Avishek
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2015, 2015, 8956 : 278 - 287
  • [2] An Efficient and Secure Multi-Secret Image Sharing Scheme with General Access Structure
    Lee, Ching-Fan
    Juan, Justie Su-Tzu
    2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, : 253 - 259
  • [3] An Efficient and Secure Multi-Secret Sharing Scheme with General Access Structures
    PANG Liaojun~ 1
    2. School of Computer Science
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1649 - 1652
  • [4] Multi-secret sharing scheme based on the general access structure
    Pang, Liaojun
    Jiang, Zhengtao
    Wang, Yumin
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2006, 43 (01): : 33 - 38
  • [5] Multi-Use Multi-Secret Sharing Scheme for General Access Structure
    Roy, Partha Sarathi
    Adhikari, Avishek
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (04): : 50 - 57
  • [6] Multi-Secret Sharing Threshold Access Structure
    Reddy, L. Siva
    Prasad, Munaga V. N. K.
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 1585 - 1590
  • [7] Multi-secret sharing scheme with general access structures
    Li, Hui-Xian
    Cheng, Chun-Tian
    Pang, Liao-Jun
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2006, 34 (06): : 95 - 98
  • [8] An Efficient Multi-secret Sharing Scheme with General Access Structures
    Wei Yun
    Zhang Xingkai
    Xiong Guohua
    ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, : 1246 - 1250
  • [9] A cheat-proof multi-secret sharing scheme based on general access structure
    College of Information, Guangdong Ocean University, Zhanjiang 524088, China
    不详
    Jisuanji Gongcheng, 2006, 13 (159-160+172):
  • [10] A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure
    Alam, Irfan
    Alali, Amal S.
    Ali, Shakir
    Asri, Muhammad S. M.
    AXIOMS, 2024, 13 (08)