Detecting dealer cheating in secret sharing systems

被引:3
|
作者
Chang, CC [1 ]
Chan, CW [1 ]
机构
[1] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 62107, Taiwan
关键词
secret sharing system; (t; n)-threshold scheme; Lagrange interpolating formula; entropy;
D O I
10.1109/CMPSAC.2000.884763
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The concept of secret sharing can be used in a wide range of business application. A secret sharing system can implement the policies of secret sharing, and control the distribution of the secrets to the participants tinder the secret sharing policies. But, it can be damaged when the dealer cheating occurs. If the secret sharing system is implemented by Shamir's (t, n)-threshold scheme, one of the dealer's cheatings is that the dealer uses incorrectly polynomials to generate shadows (or shares) and distributes these error shadows to the participants. How can we detect this cheating? In this paper, we propose a method to handle the detection of that the dealer uses wrong degree of the polynomial which the dealer chooses to hide the key. The main idea of the proposed method is that Lye ask the dealer to generate a certificate polynomial and one-bit verifying keys to provide information when participants do the detection process.
引用
收藏
页码:449 / 453
页数:5
相关论文
共 50 条
  • [1] On cheating immune secret sharing
    Pieprzyk, J
    Zhang, XM
    [J]. DISCRETE MATHEMATICS AND THEORETICAL COMPUTER SCIENCE, 2004, 6 (02): : 253 - 264
  • [2] Cheating Resistance for Secret Sharing
    Chan, Chao-Wen
    Chang, Chin-Chen
    Wang, Zhi-Hui
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 840 - +
  • [3] ROBUST SHARING OF SECRETS WHEN THE DEALER IS HONEST OR CHEATING
    RABIN, T
    [J]. JOURNAL OF THE ASSOCIATION FOR COMPUTING MACHINERY, 1994, 41 (06): : 1089 - 1109
  • [5] Strictly cheating immune secret sharing
    Zhang, J
    Wen, QY
    [J]. ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 514 - 519
  • [6] Cheating prevention in linear secret sharing
    Pieprzyk, J
    Zhang, XM
    [J]. INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 121 - 135
  • [7] Outsourced cheating detection for secret sharing
    Cianciullo, Louis
    Ghodosi, Hossein
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (06) : 871 - 878
  • [8] Outsourced cheating detection for secret sharing
    Louis Cianciullo
    Hossein Ghodosi
    [J]. International Journal of Information Security, 2021, 20 : 871 - 878
  • [9] Cheating Immune Threshold Visual Secret Sharing
    De Prisco, Roberto
    De Santis, Alfredo
    [J]. COMPUTER JOURNAL, 2010, 53 (09): : 1485 - 1496
  • [10] Visual secret sharing with cheating prevention revisited
    Chen, Yu-Chi
    Tsai, Du-Shiau
    Horng, Gwoboa
    [J]. DIGITAL SIGNAL PROCESSING, 2013, 23 (05) : 1496 - 1504