A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps

被引:21
|
作者
Eslami, Ziba [1 ,2 ]
Rad, Saideh Kabiri [1 ]
机构
[1] Shahid Beheshti Univ, Dept Comp Sci, Tehran, Iran
[2] Inst Res Fundamental Sci IPM, Sch Math, Tehran, Iran
关键词
Threshold scheme; Verifiable scheme; Multi-secret sharing; Bilinear pairing; Multi-use scheme; STEGANOGRAPHY;
D O I
10.1007/s11277-010-0143-0
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In a (t, n)-threshold multi-secret sharing scheme, several secrets are shared among n participants in such a way that any t (or more) of them can reconstruct the secrets while a group of (t - 1) can not obtain any information. Therefore, when such schemes are used to distribute sensitive information over a network, fault tolerance property is achieved since even if n - t of the nodes go out of function, the remaining t nodes suffice to recover the information. In 2009, Wang et al. proposed a verifiable (t, n)-threshold multi-secret sharing scheme (WTS) based on elliptic curves in which the secrets can change periodically [Wireless Pers. Commun., Springer-Verlage, doi: 10.1007/s11277-009-9875-0]. In this paper, we propose a verifiable (t, n)-threshold multi-secret sharing scheme based on bilinear maps. Our scheme does not require a secure channel and participants can verify the shares pooled in the reconstruction phase. Our proposed scheme is multi-use such that in order to change the secrets, it is sufficient to renew some public information. Furthermore, the proposed scheme is flexible to the threshold value. Therefore, our proposed scheme has all the merits of (WTS), however, we achieve two major improvements. First when the secrets are to be changed, we require to publish fewer public values. This reduction can be very important in certain applications such as steganographic use of secret sharing schemes. The second is that (WTS) is designed with the assumption that the number of secrets (m) is equal to the threshold t so that the case m > t is handled by repeating the scheme left perpendicular m/t right perpendicular times. However, in designing the scheme we do not assume any restrictions on the number of secrets.
引用
收藏
页码:459 / 467
页数:9
相关论文
共 50 条
  • [21] Dynamic Threshold Multi-secret Sharing Scheme Using Elliptic Curve and Bilinear Maps
    Wang, Shiuh-Jeng
    Tsai, Yuh-Ren
    Shen, Jian-Jhih
    FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 883 - +
  • [22] A Verifiable Multi-Secret Sharing Scheme with Elliptic Curve Cryptography
    Chattopadhyay, Arup Kumar
    Maitra, Paramita
    Nag, Amitava
    Saha, Himadri Nath
    2018 IEEE 9TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2018, : 1374 - 1379
  • [23] A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure
    Alam, Irfan
    Alali, Amal S.
    Ali, Shakir
    Asri, Muhammad S. M.
    AXIOMS, 2024, 13 (08)
  • [24] Leakage-resilient verifiable multi-secret sharing scheme
    Shen H.
    Chen M.-W.
    Zhang M.-W.
    Beijing Youdian Daxue Xuebao, 1 (87-91): : 87 - 91
  • [25] A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme
    Shao, J
    Cao, ZF
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) : 135 - 140
  • [26] A Verifiable Multi-Secret Sharing Scheme Based on ℓ-Intersection Pair of Cyclic Codes
    Hossain, Md Ajaharul
    Bandi, Ramakrishna
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2023,
  • [27] Verifiable multi-secret sharing based on LFSR sequences
    Hu, Chunqiang
    Liao, Xiaofeng
    Cheng, Xiuzhen
    THEORETICAL COMPUTER SCIENCE, 2012, 445 : 52 - 62
  • [28] An Efficient Verifiable Threshold Multi-Secret Sharing Scheme With Different Stages
    Chen, Dong
    Lu, Wei
    Xing, Weiwei
    Wang, Na
    IEEE ACCESS, 2019, 7 : 107104 - 107110
  • [29] A Cellular Automata Based Verifiable Multi-secret Sharing Scheme Without a Trusted Dealer
    Li Meng
    Yu Jia
    Hao Rong
    CHINESE JOURNAL OF ELECTRONICS, 2017, 26 (02) : 313 - 318
  • [30] A Cellular Automata Based Verifiable Multi-secret Sharing Scheme Without a Trusted Dealer
    LI Meng
    YU Jia
    HAO Rong
    Chinese Journal of Electronics, 2017, 26 (02) : 313 - 318