Almost Optimal Cheating-Detectable (2, 2, n) Ramp Secret Sharing Scheme

被引:0
|
作者
Agematsu, Tomoki [1 ]
Obana, Satoshi [2 ]
机构
[1] Hosei Univ, Grad Sch Comp & Informat Sci, Tokyo, Japan
[2] Hosei Univ, Fac Comp & Informat Sci, Tokyo, Japan
关键词
ramp secret sharing scheme; cheating detection; substitution attacks;
D O I
10.1109/CANDAR.2019.00009
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this research, we consider a strong ramp secret sharing scheme that can detect cheating. A cheating-detectable (k, L, n) ramp secret sharing scheme has been studied so far, and a strong ramp secret sharing scheme which achieves lower bounds on the size of shares and random number used in encoding (i. e., share generation), and the successful cheating probability of impersonation attack has been presented. Now a challenging task is to achieve the lower bound on the successful cheating probability of substitution attack. In this paper, we present a strong (2, 2, n) ramp secret sharing scheme that almost achieves the lower bound on the successful cheating probability of substitution attack. Although the parameter is limited to (2, 2, n) type ramp scheme, the proposed scheme is the first to almost achieve the lower bound. Moreover the proposed scheme also achieves other lower bounds such as those on the size of shares and random number used in encoding, and the successful cheating probability of impersonation attack. To achieve the lower bound on the successful cheating probability of substitution attack, we take a unique strategy to construct the scheme. Most existing works present generic type verification functions that can be applied to arbitrary linear and strong (k, L, n) ramp secret sharing schemes. On the other hand, our proposed verification function (one of those which we call limited type verification functions) cannot be applied to arbitrary strong (k, L, n) ramp schemes but applied to a special case of strong (2, 2, n) ramp schemes with certain property, which make it possible to (almost) achieve the lower bound on the successful cheating probability of substitution attack. Fortunately, we can prove that, for any secret (S-1, S-2) is an element of GF(p(m))(2), there exist sufficiently many strong (2, 2, n) ramp schemes with which the proposed scheme is proven to be secure. Further, we suggest that it is difficult to generalize our strategy to more generalized parameter because of the difficulty to find conditions of strong (k, L, n) ramp schemes with which any limited type verification functions guarantee security against substitution attacks.
引用
收藏
页码:1 / 9
页数:9
相关论文
共 50 条
  • [31] Applying cheating identifiable secret sharing scheme in multimedia security
    Zheng Ma
    Yan Ma
    Xiaohong Huang
    Manjun Zhang
    Yanxiao Liu
    [J]. EURASIP Journal on Image and Video Processing, 2020
  • [32] Efficient Secret Image Sharing Scheme with Authentication and Cheating Prevention
    Zhang, Lina
    Dang, Xuan
    Feng, Li
    Yang, Junhan
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2021, 2021
  • [33] Applying cheating identifiable secret sharing scheme in multimedia security
    Ma, Zheng
    Ma, Yan
    Huang, Xiaohong
    Zhang, Manjun
    Liu, Yanxiao
    [J]. EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING, 2020, 2020 (01)
  • [34] A Simple and Efficient Secret Sharing Scheme Secure against Cheating
    Araki, Toshinori
    Ogata, Wakaha
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (06) : 1338 - 1345
  • [35] Publicly verifiable secret sharing scheme and its application with almost optimal information rate
    Peng, Qiao
    Tian, Youliang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 6227 - 6238
  • [36] A (w, t, n)-weighted threshold dynamic quantum secret sharing scheme with cheating identification
    Li, Fulin
    Luo, Mei
    Zhu, Huihui
    Zhu, Shixin
    Pang, Binbin
    [J]. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2023, 612
  • [37] Hybrid (2, n) Visual Secret Sharing Scheme for Color Images
    Lee, Jung-San
    Le, T. Hoang Ngan
    [J]. 2009 IEEE-RIVF INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES: RESEARCH, INNOVATION AND VISION FOR THE FUTURE, 2009, : 320 - +
  • [38] A probable cheating-free (t, n) threshold secret sharing scheme with enhanced blockchain
    Biswas, Anindya Kumar
    Dasgupta, Mou
    Ray, Sangram
    Khan, Muhammad Khurram
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 100
  • [39] A (2, n)-SECRET SHARING SCHEME BASED ON LINEAR CELLULAR AUTOMATA
    Martin Del Rey, A.
    Queiruga Dios, A.
    Rodriguez Sanchez, G.
    [J]. INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2008, 19 (10): : 1529 - 1535
  • [40] Almost Optimum Secret Sharing Schemes with Cheating Detection for Random Bit Strings
    Hoshino, Hidetaka
    Obana, Satoshi
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 213 - 222