Properties and constraints of cheating-immune secret sharing schemes

被引:5
|
作者
D'Arco, P [1 ]
Kishimoto, W
Stinson, DR
机构
[1] Univ Salerno, Dipartimento Informat & Applicaz, I-84081 Baronissi, SA, Italy
[2] Chiba Univ, Dept Informat & Image Sci, Chiba 2638522, Japan
[3] Univ Waterloo, Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
关键词
cryptography; secret sharing; cheating; resilient functions;
D O I
10.1016/j.dam.2005.03.026
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
A secret sharing scheme is a cryptographic protocol by means of which a dealer shares a secret among a set of participants in such a way that it can be subsequently reconstructed by certain qualified subsets. The setting we consider is the following: in a first phase, the dealer gives in a secure way a piece of information, called a share, to each participant. Then, participants belonging to a qualified subset send in a secure way their shares to a trusted party, referred to as a combiner, who computes the secret and sends it back to the participants. Cheating-immume secret sharing schemes are secret sharing schemes in the above setting where dishonest participants, during the reconstruction phase, have no advantage in sending incorrect shares to the combiner (i.e., cheating) as compared to honest participants. More precisely, a coalition of dishonest participants, by using their correct shares and the incorrect secret supplied by the combiner, have no better chance in determining the true secret (that would have been reconstructed if they submitted correct shares) than an honest participant. In this paper we study properties and constraints of cheating-immune secret sharing schemes. We show that a perfect secret sharing scheme cannot be cheating-immune. Then, we prove an upper bound on the number of cheaters tolerated in such schemes. We also repair a previously proposed construction to realize cheating-immune secret sharing schemes. Finally, we discuss some open problems. (c) 2005 Elsevier B.V. All rights reserved.
引用
收藏
页码:219 / 233
页数:15
相关论文
共 50 条
  • [1] Cheating-immune secret sharing schemes from codes and cumulative arrays
    dela Cruz, Romar
    Wang, Huaxiong
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2013, 5 (01): : 67 - 83
  • [2] Cheating-immune secret sharing schemes from codes and cumulative arrays
    Romar dela Cruz
    Huaxiong Wang
    [J]. Cryptography and Communications, 2013, 5 : 67 - 83
  • [3] Cheating-Immune Secret Sharing Schemes from Maiorana-McFarland Boolean Functions
    dela Cruz, Romar B.
    Ol, Say
    [J]. INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 233 - 247
  • [5] On cheating immune secret sharing
    Pieprzyk, J
    Zhang, XM
    [J]. DISCRETE MATHEMATICS AND THEORETICAL COMPUTER SCIENCE, 2004, 6 (02): : 253 - 264
  • [6] Strictly cheating immune secret sharing
    Zhang, J
    Wen, QY
    [J]. ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 514 - 519
  • [7] CHEATING DETECTION AND CHEATER IDENTIFICATION IN SECRET SHARING SCHEMES
    WU, TC
    WU, TS
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1995, 142 (05): : 367 - 369
  • [8] Leakage Resilient Cheating Detectable Secret Sharing Schemes
    Dutta, Sabyasachi
    Safavi-Naini, Reihaneh
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 3 - 23
  • [9] Cheating Immune Threshold Visual Secret Sharing
    De Prisco, Roberto
    De Santis, Alfredo
    [J]. COMPUTER JOURNAL, 2010, 53 (09): : 1485 - 1496
  • [10] Flaws in some secret sharing schemes against cheating
    Araki, Toshinori
    Obana, Satoshi
    [J]. Information Security and Privacy, Proceedings, 2007, 4586 : 122 - 132