On constructing 1-cheating immune secret-sharing functions

被引:1
|
作者
Zhang, WeiGuo [1 ]
Sun, Xi [1 ]
Yang, JunPo [1 ]
机构
[1] Xidian Univ, ISN Lab, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
Boolean functions; cheating immune; secret sharing; resiliency; SAC;
D O I
10.1080/00207160.2011.638060
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Cheating prevention is an important cryptographic problem in secret-sharing schemes. In this paper, two constructions of 1-cheating immune secret-sharing functions are presented. Then a method for constructing new 1-cheating immune secret-sharing functions from known ones is given.
引用
收藏
页码:30 / 34
页数:5
相关论文
共 50 条
  • [41] Real-time cheating immune secret sharing for remote sensing images
    Shivendra Shivani
    Subhash Chandra Patel
    Vinay Arora
    Bhisham Sharma
    Alireza Jolfaei
    Gautam Srivastava
    [J]. Journal of Real-Time Image Processing, 2021, 18 : 1493 - 1508
  • [42] Cheating-immune secret sharing schemes from codes and cumulative arrays
    dela Cruz, Romar
    Wang, Huaxiong
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2013, 5 (01): : 67 - 83
  • [43] Real-time cheating immune secret sharing for remote sensing images
    Shivani, Shivendra
    Patel, Subhash Chandra
    Arora, Vinay
    Sharma, Bhisham
    Jolfaei, Alireza
    Srivastava, Gautam
    [J]. JOURNAL OF REAL-TIME IMAGE PROCESSING, 2021, 18 (05) : 1493 - 1508
  • [44] Cheating-immune secret sharing schemes from codes and cumulative arrays
    Romar dela Cruz
    Huaxiong Wang
    [J]. Cryptography and Communications, 2013, 5 : 67 - 83
  • [45] Cheating immune multi-secret sharing without predefined order of secrets
    Lin, Changlu
    Yan, Xingfu
    Niu, Qiwen
    Hu, Huidan
    [J]. JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2019, 42 (01) : 15 - 19
  • [46] How Secret-sharing can Defeat Terrorist Fraud
    Avoine, Gildas
    Lauradoux, Cedric
    Martin, Benjamin
    [J]. WISEC 11: PROCEEDINGS OF THE FOURTH ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2011, : 145 - 155
  • [47] Secret-Sharing: Interactions Between a Child, Robot, and Adult
    Bethel, Cindy L.
    Stevenson, Matthew R.
    Scassellati, Brian
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2011, : 2489 - 2494
  • [48] Secret-Sharing Hardware Improves the Privacy of Network Monitoring
    Wolkerstorfer, Johannes
    [J]. DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, 2011, 6514 : 51 - 63
  • [49] Entropic inequalities for a class of quantum secret-sharing states
    Sarvepalli, Pradeep
    [J]. PHYSICAL REVIEW A, 2011, 83 (04):
  • [50] MDS secret-sharing scheme secure against cheaters
    Okada, K
    Kurosawa, K
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (03) : 1078 - 1081