A practical verifiable multi-secret sharing scheme

被引:119
|
作者
Zhao, Jianjie
Zhang, Jianzhong
Zhao, Rong [1 ]
机构
[1] Shaanxi Normal Univ, Coll Math & Informat Sci, Xian 710062, Peoples R China
[2] Xian Univ Technol, Inst Nat Sci, Xian 710048, Peoples R China
基金
中国国家自然科学基金;
关键词
cryptography; verification; multi-secret sharing; security channel;
D O I
10.1016/j.csi.2006.02.004
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
C.-C. Yang, T.-Y. Chang, M.-S. Hwang [C.-C. Yang, T.-Y Chang, M.-S. Hwang, A (t,n) multi-secret sharing scheme, Applied Mathematics and Computation 151 (2004) 483-490] proposed an efficient multi-secret sharing scheme based on a two-variable one-way function in 2004. But the scheme doesn't have the property of verification. A practical verifiable multi-secret sharing scheme, which is based on the YCH scheme and the intractability of the discrete logarithm, is proposed in this paper. Our scheme solves the problems in the YCH scheme; each participant chooses her/his own shadow by her/himself, so the system doesn't need a security channel and the cost of the system can be lowered. The scheme can be used in practice widely. (c) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:138 / 141
页数:4
相关论文
共 50 条
  • [41] A non-interactive (t, n)-publicly verifiable multi-secret sharing scheme
    Mashahdi, Samaneh
    Bagherpour, Bagher
    Zaghian, Ali
    DESIGNS CODES AND CRYPTOGRAPHY, 2022, 90 (08) : 1761 - 1782
  • [42] A verifiable multi-secret image sharing scheme using XOR operation and hash function
    Chattopadhyay, Arup Kumar
    Nag, Amitava
    Singh, Jyoti Prakash
    Singh, Amit Kumar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (28-29) : 35051 - 35080
  • [43] A (k,t,n) verifiable multi-secret sharing scheme based on adversary structure
    Li, Jing
    Wang, Licheng
    Yan, Jianhua
    Niu, Xinxin
    Yang, Yixian
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (12): : 4552 - 4567
  • [44] A verifiable multi-secret image sharing scheme using XOR operation and hash function
    Arup Kumar Chattopadhyay
    Amitava Nag
    Jyoti Prakash Singh
    Amit Kumar Singh
    Multimedia Tools and Applications, 2021, 80 : 35051 - 35080
  • [45] How to construct a verifiable multi-secret sharing scheme based on graded encoding schemes
    Dehkordi, Massoud Hadian
    Oraei, Hossein
    IET INFORMATION SECURITY, 2019, 13 (04) : 343 - 351
  • [46] A Verifiable (k,n,m)-Threshold Multi-secret Sharing Scheme Based on NTRU Cryptosystem
    Amroudi, Ali Nakhaei
    Zaghain, Ali
    Sajadieh, Mahdi
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) : 1393 - 1405
  • [47] A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme
    Shao, J
    Cao, ZF
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) : 135 - 140
  • [48] An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme
    Chang, TY
    Hwang, MS
    Yang, WP
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 163 (01) : 169 - 178
  • [49] Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme
    Wang, Na
    Cai, Yuanyuan
    Fu, Junsong
    Chen, Xiqi
    IEEE ACCESS, 2020, 8 : 20799 - 20804
  • [50] A (t, n) multi-secret sharing scheme
    Yang, CC
    Chang, TY
    Hwang, MS
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 151 (02) : 483 - 490