Almost Optimal Cheating-Detectable (2, 2, n) Ramp Secret Sharing Scheme

被引:0
|
作者
Agematsu, Tomoki [1 ]
Obana, Satoshi [2 ]
机构
[1] Hosei Univ, Grad Sch Comp & Informat Sci, Tokyo, Japan
[2] Hosei Univ, Fac Comp & Informat Sci, Tokyo, Japan
关键词
ramp secret sharing scheme; cheating detection; substitution attacks;
D O I
10.1109/CANDAR.2019.00009
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this research, we consider a strong ramp secret sharing scheme that can detect cheating. A cheating-detectable (k, L, n) ramp secret sharing scheme has been studied so far, and a strong ramp secret sharing scheme which achieves lower bounds on the size of shares and random number used in encoding (i. e., share generation), and the successful cheating probability of impersonation attack has been presented. Now a challenging task is to achieve the lower bound on the successful cheating probability of substitution attack. In this paper, we present a strong (2, 2, n) ramp secret sharing scheme that almost achieves the lower bound on the successful cheating probability of substitution attack. Although the parameter is limited to (2, 2, n) type ramp scheme, the proposed scheme is the first to almost achieve the lower bound. Moreover the proposed scheme also achieves other lower bounds such as those on the size of shares and random number used in encoding, and the successful cheating probability of impersonation attack. To achieve the lower bound on the successful cheating probability of substitution attack, we take a unique strategy to construct the scheme. Most existing works present generic type verification functions that can be applied to arbitrary linear and strong (k, L, n) ramp secret sharing schemes. On the other hand, our proposed verification function (one of those which we call limited type verification functions) cannot be applied to arbitrary strong (k, L, n) ramp schemes but applied to a special case of strong (2, 2, n) ramp schemes with certain property, which make it possible to (almost) achieve the lower bound on the successful cheating probability of substitution attack. Fortunately, we can prove that, for any secret (S-1, S-2) is an element of GF(p(m))(2), there exist sufficiently many strong (2, 2, n) ramp schemes with which the proposed scheme is proven to be secure. Further, we suggest that it is difficult to generalize our strategy to more generalized parameter because of the difficulty to find conditions of strong (k, L, n) ramp schemes with which any limited type verification functions guarantee security against substitution attacks.
引用
收藏
页码:1 / 9
页数:9
相关论文
共 50 条
  • [1] A Cheating-Detectable (k, L, n) Ramp Secret Sharing Scheme
    Nakamura, Wataru
    Yamamoto, Hirosuke
    Chan, Terence
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (12) : 2709 - 2719
  • [2] An efficient cheating-detectable secret image sharing scheme with smaller share sizes
    Liu, Zuquan
    Zhu, Guopu
    Zhang, Yu
    Zhang, Hongli
    Kwong, Sam
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 81
  • [3] A Coding Theorem for Cheating-Detectable (2,2)-Threshold Blockwise Secret Sharing Schemes
    Iwamoto, Mitsugu
    Yamamoto, Hirosuke
    Koga, Hiroki
    [J]. 2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, : 1308 - +
  • [4] Cheating Detectable Secret Sharing Scheme Suitable for Implementation
    Hoshino, Hidetaka
    Obana, Satoshi
    [J]. 2016 FOURTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2016, : 623 - 628
  • [5] A Ramp Threshold Secret Sharing Scheme against Cheating by Substitution Attacks
    Nakamura, Wataru
    Yamamoto, Hirosuke
    Chan, Terence
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 340 - 344
  • [6] Almost Optimum Secret Sharing with Cheating Detection
    Jhanwar, Mahabir Prasad
    Safavi-Naini, Reihaneh
    [J]. SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING (SPACE 2015), 2015, 9354 : 359 - 372
  • [7] Leakage Resilient Cheating Detectable Secret Sharing Schemes
    Dutta, Sabyasachi
    Safavi-Naini, Reihaneh
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 3 - 23
  • [8] Linear (k,n) secret sharing scheme with cheating detection
    Liu, Yanxiao
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2115 - 2121
  • [9] Cheating immune (2, n)-threshold visual secret sharing
    De Prisco, Roberto
    De Santis, Alfredo
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2006, 4116 : 216 - 228
  • [10] Linear (k, n) secret sharing scheme with cheating detection
    Liu, Yan-xiao
    Wang, Zhi-xiao
    Yan, Wen-yao
    [J]. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1943 - 1948