On constructing 1-cheating immune secret-sharing functions

被引:1
|
作者
Zhang, WeiGuo [1 ]
Sun, Xi [1 ]
Yang, JunPo [1 ]
机构
[1] Xidian Univ, ISN Lab, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
Boolean functions; cheating immune; secret sharing; resiliency; SAC;
D O I
10.1080/00207160.2011.638060
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Cheating prevention is an important cryptographic problem in secret-sharing schemes. In this paper, two constructions of 1-cheating immune secret-sharing functions are presented. Then a method for constructing new 1-cheating immune secret-sharing functions from known ones is given.
引用
收藏
页码:30 / 34
页数:5
相关论文
共 50 条
  • [21] THE BREADTH OF SHAMIR SECRET-SHARING SCHEME
    DAWSON, E
    DONOVAN, D
    [J]. COMPUTERS & SECURITY, 1994, 13 (01) : 69 - 78
  • [22] A quantum secret-sharing protocol with fairness
    Liu, Feng
    Qin, Su-Juan
    Wen, Qiao-Yan
    [J]. PHYSICA SCRIPTA, 2014, 89 (07)
  • [23] Improved Polynomial Secret-Sharing Schemes
    Beimel, Amos
    Farras, Oriol
    Lasri, Or
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2023, PT II, 2023, 14370 : 374 - 405
  • [24] DECOMPOSITION CONSTRUCTIONS FOR SECRET-SHARING SCHEMES
    STINSON, DR
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1994, 40 (01) : 118 - 125
  • [25] Secret-sharing matroids need not be algebraic
    Ben-Efraim, Aner
    [J]. DISCRETE MATHEMATICS, 2016, 339 (08) : 2136 - 2145
  • [26] Improving quantum secret-sharing schemes
    Nascimento, ACA
    Mueller-Quade, J
    Imai, H
    [J]. PHYSICAL REVIEW A, 2001, 64 (04): : 423111 - 423115
  • [27] Generalized semiquantum secret-sharing schemes
    Gheorghiu, Vlad
    [J]. PHYSICAL REVIEW A, 2012, 85 (05):
  • [28] Secret-sharing with a class of ternary codes
    Ding, CS
    Kohel, DR
    Ling, S
    [J]. THEORETICAL COMPUTER SCIENCE, 2000, 246 (1-2) : 285 - 298
  • [29] Cheating Resistance for Secret Sharing
    Chan, Chao-Wen
    Chang, Chin-Chen
    Wang, Zhi-Hui
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 840 - +
  • [30] Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals
    Bellare, Mihir
    Rogaway, Phillip
    [J]. CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 172 - +