A (k,t,n) verifiable multi-secret sharing scheme based on adversary structure

被引:1
|
作者
Li, Jing [1 ]
Wang, Licheng [1 ]
Yan, Jianhua [1 ]
Niu, Xinxin [1 ]
Yang, Yixian [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Informat Secur Ctr, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
(k; t; n) secret sharing; adversary structure; pre-verification property; homomorphism; ACCESS STRUCTURE; N THRESHOLD; EFFICIENT;
D O I
10.3837/tiis.2014.12.018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A (n,t,n) secret sharing scheme is to share a secret among n group members, where each member also plays a role of a dealer, and any t shares can be used to recover the secret. In this paper, we propose a strong (k,t,n) verifiable multi-secret sharing scheme, where any k out of n participants operate as dealers. The scheme realizes both threshold structure and adversary structure simultaneously, and removes a trusted third party. The secret reconstruction phase is performed using an additive homomorphism for decreasing the storage cost. Meanwhile, the scheme achieves the pre-verification property in the sense that any participant doesn't need to reveal any information about real master shares in the verification phase. We compare our proposal with the previous (n,t,n) secret sharing schemes from the perspectives of what kinds of access structures they achieve, what kinds of functionalities they support and whether heavy storage cost for secret share is required. Then it shows that our scheme takes the following advantages: (a) realizing the adversary structure, (b) allowing any k out of n participants to operate as dealers, (c) small sized secret share. Moreover, our proposed scheme is a favorable candidate to be used in many applications, such as secure multi-party computation and privacy preserving data mining, etc.
引用
收藏
页码:4552 / 4567
页数:16
相关论文
共 50 条
  • [1] A New Verifiable Multi-secret Sharing Scheme Realizing Adversary Structure
    Dehkordi, Masoud Hadian
    Farzaneh, Yousof
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (03) : 1749 - 1758
  • [2] A New Verifiable Multi-secret Sharing Scheme Realizing Adversary Structure
    Masoud Hadian Dehkordi
    Yousof Farzaneh
    [J]. Wireless Personal Communications, 2015, 82 : 1749 - 1758
  • [3] A (n, t, n) Verifiable Multi-secret Sharing Scheme with Secure Secret Reconstruction
    Meng, Li
    Qu Shaoyun
    Xun Tiantian
    Jia, Yu
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 191 - 204
  • [4] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    [J]. INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138
  • [5] A secure and efficient (t, n) threshold verifiable multi-secret sharing scheme
    Huang, MJ
    Zhang, JZ
    Xie, SC
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 532 - 537
  • [6] A Verifiable (k,n,m)-Threshold Multi-secret Sharing Scheme Based on NTRU Cryptosystem
    Amroudi, Ali Nakhaei
    Zaghain, Ali
    Sajadieh, Mahdi
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) : 1393 - 1405
  • [7] A Verifiable (k,n,m)-Threshold Multi-secret Sharing Scheme Based on NTRU Cryptosystem
    Ali Nakhaei Amroudi
    Ali Zaghain
    Mahdi Sajadieh
    [J]. Wireless Personal Communications, 2017, 96 : 1393 - 1405
  • [8] A verifiable multi-secret sharing scheme (VMSS)
    Pang Liaojun
    Li Huixian
    Jiao Licheng
    Wang Yumin
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 749 - +
  • [9] Verifiable Rational Multi-secret Sharing Scheme
    Cai, Yongquan
    Luo, Zhanhai
    Yang, Yi
    [J]. INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 : 42 - 48
  • [10] A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure
    Alam, Irfan
    Alali, Amal S.
    Ali, Shakir
    Asri, Muhammad S. M.
    [J]. AXIOMS, 2024, 13 (08)