A NEW SECRET SHARING SCHEME ADVERSARY FUZZY STRUCTURE BASED ON AUTOMATA

被引:0
|
作者
Rashkolia, A. Saeidi [1 ]
Zahedi, M. M. [1 ]
Dehkordi, M. H. [2 ]
机构
[1] Grad Univ Adv Technol, Dept Math, Kerman, Iran
[2] Iran Univ Sci & Technol, Sch Math, Tehran, Iran
来源
IRANIAN JOURNAL OF FUZZY SYSTEMS | 2018年 / 15卷 / 04期
关键词
Secret sharing; Adversary fuzzy structure; One-way hash function; Finite automaton; Weakly invertible; ONE-WAY FUNCTION;
D O I
暂无
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In this paper, we introduce a new verifiable multi-use multi-secret sharing scheme based on automata and one-way hash function. The scheme has the adversary fuzzy structure and satisfy the following properties: 1) The dealer can change the participants and the adversary fuzzy structure without refreshing any participants' real-shadow. 2) The scheme is based on the inversion of weakly invertible finite automata and its security depends on the properties of the one-way hash functions. 3) The scheme does not encounter time-consuming computations like discrete logarithm problem. 4) The validity of the transmitted data can be verified by the combiner and participants. 5) Every participant has only one reusable real-shadow, whereas the most of other existing schemes have more than one shadow. In addition, the proposed scheme which is based on automata has all the properties of a perfect scheme. Finally, the comparisons among other schemes and our scheme prove the efficiency of our scheme.
引用
收藏
页码:1 / 11
页数:11
相关论文
共 50 条
  • [1] A secret sharing scheme based on (t, n) threshold and adversary structure
    Qin, Huawang
    Dai, Yuewei
    Wang, Zhiquan
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (05) : 379 - 385
  • [2] A secret sharing scheme based on (t, n) threshold and adversary structure
    Huawang Qin
    Yuewei Dai
    Zhiquan Wang
    [J]. International Journal of Information Security, 2009, 8
  • [3] A New Verifiable Multi-secret Sharing Scheme Realizing Adversary Structure
    Dehkordi, Masoud Hadian
    Farzaneh, Yousof
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (03) : 1749 - 1758
  • [4] A New Verifiable Multi-secret Sharing Scheme Realizing Adversary Structure
    Masoud Hadian Dehkordi
    Yousof Farzaneh
    [J]. Wireless Personal Communications, 2015, 82 : 1749 - 1758
  • [5] Practical secret sharing scheme realizing generalized adversary structure
    Guo, YB
    Ma, JF
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2004, 19 (04) : 564 - 569
  • [6] Practical secret sharing scheme realizing generalized adversary structure
    Yuan-Bo Guo
    Jian-Feng Ma
    [J]. Journal of Computer Science and Technology, 2004, 19 : 564 - 569
  • [7] A secret sharing scheme based on cellular automata
    del Rey, AM
    Mateus, JP
    Sánchez, GR
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (02) : 1356 - 1364
  • [8] Recursive hiding of biometrics-based secret sharing scheme using adversary structure
    Lai, Hong
    Xiao, Jinghua
    Li, Lixiang
    Yang, Yixian
    [J]. INFORMATION PROCESSING LETTERS, 2012, 112 (17-18) : 683 - 687
  • [9] (t, n) Threshold secret image sharing scheme with adversary structure
    Cheng Guo
    Qiongqiong Yuan
    Kun Lu
    Mingchu Li
    Zhangjie Fu
    [J]. Multimedia Tools and Applications, 2017, 76 : 21193 - 21210
  • [10] (t, n) Threshold secret image sharing scheme with adversary structure
    Guo, Cheng
    Yuan, Qiongqiong
    Lu, Kun
    Li, Mingchu
    Fu, Zhangjie
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (20) : 21193 - 21210