A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction

被引:14
|
作者
Lin, Changlu [1 ,2 ]
Hu, Huidan [1 ,2 ]
Chang, Chin-Chen [3 ]
Tang, Shaohua [4 ]
机构
[1] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350117, Fujian, Peoples R China
[2] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350007, Fujian, Peoples R China
[3] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[4] South China Univ Technol, Sch Comp Sci & Engn, Guangzhou 510006, Guangdong, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Data confidentiality; computation integrity; multiple secret sharing; outsourcing computation; verifiable secret sharing;
D O I
10.1109/ACCESS.2018.2880975
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A publicly verifiable secret sharing (PVSS) scheme enjoys the public verification and the lower cost of communication than VSS scheme. However, the existing PVSS schemes cannot be applied in the scenarios of the devices with low computation ability and do not share the multiple secrets among all participants efficiently. In this paper, an efficient publicly verifiable multi-secret sharing scheme with outsourcing secret reconstruction is proposed. Each participant only spends a small amount of computational cost to recover multiple secrets because of the expensive burden of computation and verifiability is outsourced to the cloud service provider (CSP). Moreover, the CSP knows no information of the secrets, and the participants have the abilities to verify the returned result. We also prove that our scheme is secure under the hardness assumption of the discrete logarithm problem and the modified generalized bilinear inversion problem.
引用
收藏
页码:70666 / 70673
页数:8
相关论文
共 50 条
  • [41] A pairing-based publicly verifiable secret sharing scheme
    Tsu-Yang Wu
    Yuh-Min Tseng
    Journal of Systems Science and Complexity, 2011, 24 : 186 - 194
  • [42] A PAIRING-BASED PUBLICLY VERIFIABLE SECRET SHARING SCHEME
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2011, 24 (01) : 186 - 194
  • [43] Publicly verifiable function secret sharing
    Wang, Qiang
    Zhou, Fucai
    Peng, Su
    Xu, Jian
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2019, 20 (04) : 526 - 535
  • [44] Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks
    Gan, Yuanju
    Wang, Lihua
    Wang, Licheng
    Pan, Ping
    Yang, Yixian
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [45] Dynamic and verifiable multi-secret sharing scheme based on Hermite interpolation and bilinear maps
    Tadayon, Mohammad Hesam
    Khanmohammadi, Hadi
    Haghighi, Mohammad Sayad
    IET INFORMATION SECURITY, 2015, 9 (04) : 234 - 239
  • [46] A Cellular Automata Based Verifiable Multi-secret Sharing Scheme Without a Trusted Dealer
    Li Meng
    Yu Jia
    Hao Rong
    CHINESE JOURNAL OF ELECTRONICS, 2017, 26 (02) : 313 - 318
  • [47] A verifiable multi-secret image sharing scheme using XOR operation and hash function
    Chattopadhyay, Arup Kumar
    Nag, Amitava
    Singh, Jyoti Prakash
    Singh, Amit Kumar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (28-29) : 35051 - 35080
  • [48] A (k,t,n) verifiable multi-secret sharing scheme based on adversary structure
    Li, Jing
    Wang, Licheng
    Yan, Jianhua
    Niu, Xinxin
    Yang, Yixian
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (12): : 4552 - 4567
  • [49] A Cellular Automata Based Verifiable Multi-secret Sharing Scheme Without a Trusted Dealer
    LI Meng
    YU Jia
    HAO Rong
    ChineseJournalofElectronics, 2017, 26 (02) : 313 - 318
  • [50] A (t, n) multi-secret sharing scheme
    Yang, CC
    Chang, TY
    Hwang, MS
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 151 (02) : 483 - 490