A VERIFIABLE MULTI-SECRET SHARING SCHEME

被引:0
|
作者
Wang, Yong [1 ]
Zhu, Yanqin [1 ]
Luo, Xizhao [1 ]
机构
[1] Soochow Univ, Sch Comp Sci & Technol, Suzhou 215006, Peoples R China
关键词
Multi-Secret Sharing; RSA Cryptosystem; Schnorr Signature; Verification;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
YCH scheme is a multi-secret sharing scheme based on two-variable. one-way function and Shamir's threshold secret sharing scheme, but the scheme does not have the property of verification. This paper presents a verifiable multi-secret sharing scheme based on YCH scheme, RSA cryptosystem, and Schnorr signature. It dose not need a secure channel and each participant chooses his secret shadow by himself, and it can defend positive attack of dealer and participants.
引用
收藏
页码:136 / 138
页数:3
相关论文
共 50 条
  • [1] A verifiable multi-secret sharing scheme (VMSS)
    Pang Liaojun
    Li Huixian
    Jiao Licheng
    Wang Yumin
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 749 - +
  • [2] Verifiable Rational Multi-secret Sharing Scheme
    Cai, Yongquan
    Luo, Zhanhai
    Yang, Yi
    [J]. INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 : 42 - 48
  • [3] A practical verifiable multi-secret sharing scheme
    Zhao, Jianjie
    Zhang, Jianzhong
    Zhao, Rong
    [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) : 138 - 141
  • [4] On Novel Verifiable Multi-Secret Sharing Scheme
    Wang, Jian
    Liu, Yanheng
    Wang, Yanxi
    [J]. ADVANCED SCIENCE LETTERS, 2011, 4 (11-12) : 3709 - 3715
  • [5] A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction
    Lin, Changlu
    Hu, Huidan
    Chang, Chin-Chen
    Tang, Shaohua
    [J]. IEEE ACCESS, 2018, 6 : 70666 - 70673
  • [6] A verifiable multi-secret sharing scheme based on cellular automata
    Eslami, Z.
    Ahmadabadi, J. Zarepour
    [J]. INFORMATION SCIENCES, 2010, 180 (15) : 2889 - 2894
  • [7] A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure
    Alam, Irfan
    Alali, Amal S.
    Ali, Shakir
    Asri, Muhammad S. M.
    [J]. AXIOMS, 2024, 13 (08)
  • [8] A Verifiable Multi-Secret Sharing Scheme with Elliptic Curve Cryptography
    Chattopadhyay, Arup Kumar
    Maitra, Paramita
    Nag, Amitava
    Saha, Himadri Nath
    [J]. 2018 IEEE 9TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2018, : 1374 - 1379
  • [9] Publicly verifiable multi-secret sharing scheme from bilinear pairings
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    [J]. IET INFORMATION SECURITY, 2013, 7 (03) : 239 - 246
  • [10] Verifiable multi-secret sharing scheme based on S-multiplication
    He, MX
    Fan, PZ
    Kaderali, F
    [J]. WAVELET ANALYSIS AND ITS APPLICATIONS, AND ACTIVE MEDIA TECHNOLOGY, VOLS 1 AND 2, 2004, : 602 - 608