A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps

被引:21
|
作者
Eslami, Ziba [1 ,2 ]
Rad, Saideh Kabiri [1 ]
机构
[1] Shahid Beheshti Univ, Dept Comp Sci, Tehran, Iran
[2] Inst Res Fundamental Sci IPM, Sch Math, Tehran, Iran
关键词
Threshold scheme; Verifiable scheme; Multi-secret sharing; Bilinear pairing; Multi-use scheme; STEGANOGRAPHY;
D O I
10.1007/s11277-010-0143-0
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In a (t, n)-threshold multi-secret sharing scheme, several secrets are shared among n participants in such a way that any t (or more) of them can reconstruct the secrets while a group of (t - 1) can not obtain any information. Therefore, when such schemes are used to distribute sensitive information over a network, fault tolerance property is achieved since even if n - t of the nodes go out of function, the remaining t nodes suffice to recover the information. In 2009, Wang et al. proposed a verifiable (t, n)-threshold multi-secret sharing scheme (WTS) based on elliptic curves in which the secrets can change periodically [Wireless Pers. Commun., Springer-Verlage, doi: 10.1007/s11277-009-9875-0]. In this paper, we propose a verifiable (t, n)-threshold multi-secret sharing scheme based on bilinear maps. Our scheme does not require a secure channel and participants can verify the shares pooled in the reconstruction phase. Our proposed scheme is multi-use such that in order to change the secrets, it is sufficient to renew some public information. Furthermore, the proposed scheme is flexible to the threshold value. Therefore, our proposed scheme has all the merits of (WTS), however, we achieve two major improvements. First when the secrets are to be changed, we require to publish fewer public values. This reduction can be very important in certain applications such as steganographic use of secret sharing schemes. The second is that (WTS) is designed with the assumption that the number of secrets (m) is equal to the threshold t so that the case m > t is handled by repeating the scheme left perpendicular m/t right perpendicular times. However, in designing the scheme we do not assume any restrictions on the number of secrets.
引用
收藏
页码:459 / 467
页数:9
相关论文
共 50 条
  • [31] A (k,t,n) verifiable multi-secret sharing scheme based on adversary structure
    Li, Jing
    Wang, Licheng
    Yan, Jianhua
    Niu, Xinxin
    Yang, Yixian
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (12): : 4552 - 4567
  • [32] A (n, t, n) Verifiable Multi-secret Sharing Scheme with Secure Secret Reconstruction
    Meng, Li
    Qu Shaoyun
    Xun Tiantian
    Jia, Yu
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 191 - 204
  • [33] How to construct a verifiable multi-secret sharing scheme based on graded encoding schemes
    Dehkordi, Massoud Hadian
    Oraei, Hossein
    IET INFORMATION SECURITY, 2019, 13 (04) : 343 - 351
  • [34] A Finite Equivalence of Verifiable Multi-secret Sharing
    Zhao, Hui
    Li, Mingchu
    Sakurai, Kouichi
    Ren, Yizhi
    Sun, Jonathan Z.
    Wang, Fengying
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2012, 5 (01) : 1 - 12
  • [35] A Finite Equivalence of Verifiable Multi-secret Sharing
    Hui Zhao
    Mingchu Li
    Kouichi Sakurai
    Yizhi Ren
    Jonathan Z. Sun
    Fengying Wang
    International Journal of Computational Intelligence Systems, 2012, 5 : 1 - 12
  • [36] New efficient and practical verifiable multi-secret sharing schemes
    Dehkordi, Massoud Hadian
    Mashhadi, Samaneh
    INFORMATION SCIENCES, 2008, 178 (09) : 2262 - 2274
  • [37] A new multi-secret image sharing scheme based on DCT
    Oinam Bidyapati Chanu
    Arambam Neelima
    The Visual Computer, 2020, 36 : 939 - 950
  • [38] An efficient threshold verifiable multi-secret sharing
    Dehkordi, Massoud Hadian
    Mashhadi, Samaneh
    COMPUTER STANDARDS & INTERFACES, 2008, 30 (03) : 187 - 190
  • [39] A verifiable rational secret sharing scheme based on bilinear pairing
    Zhang, E. (zhangenzdrj@163.com), 1600, Chinese Institute of Electronics (40):
  • [40] A new multi-secret image sharing scheme based on DCT
    Chanu, Oinam Bidyapati
    Neelima, Arambam
    VISUAL COMPUTER, 2020, 36 (05): : 939 - 950