Space-Efficient Verifiable Secret Sharing Using Polynomial Interpolation

被引:9
|
作者
Cafaro, Massimo [1 ]
Pelle, Piergiuseppe [1 ]
机构
[1] Univ Salento, Dept Engn Innovat, I-73100 Lecce, Italy
关键词
Security and privacy protection; cryptographic controls; verification;
D O I
10.1109/TCC.2015.2396072
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Preserving data confidentiality in clouds is a key issue. Secret Sharing, a cryptographic primitive for the distribution of a secret among a group of n participants designed so that only subsets of shareholders of cardinality 0 < t <= n are allowed to reconstruct the secret by pooling their shares, can helpmitigating andminimizing the problem. A desirable feature of Secret Sharing schemes is cheater detection, i.e., the ability to detect one ormoremalicious shareholders trying to reconstruct the secret by obtaining legal shares from the other shareholders while providing themwith fake shares. Verifiable Secret Sharing schemes solve this problemby allowing shareholders verifying the others' shares. We present new verification algorithms providing arbitrary secret sharing schemeswith cheater detection capabilities, and prove their space efficiency with regard to other schemes appeared in the literature. We also introduce, in one of our schemes, the Exponentiating Polynomial Root Problem (EPRP), which is believed to beNP-Intermediate and therefore difficult.
引用
收藏
页码:453 / 463
页数:11
相关论文
共 50 条
  • [1] Secure cloud-of-clouds storage with space-efficient secret sharing
    Niknia, Ahad
    Correia, Miguel
    Karimpour, Jaber
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 59
  • [2] Publicly Verifiable Homomorphic Secret Sharing for Polynomial Evaluation
    Chen, Xin
    Zhang, Liang Feng
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4609 - 4624
  • [3] Broadcast (and Round) Efficient Verifiable Secret Sharing
    Garay, Juan
    Givens, Clint
    Ostrovsky, Rafail
    Raykov, Pavel
    [J]. INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 200 - 219
  • [4] Secure and verifiable vector space secret sharing scheme
    Xiao, QH
    Ping, LD
    Pan, XZ
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOL 2, 2004, : 689 - 693
  • [5] Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation
    Patra, Arpita
    Choudhury, Ashish
    Rangan, C. Pandu
    [J]. JOURNAL OF CRYPTOLOGY, 2015, 28 (01) : 49 - 109
  • [6] An efficient threshold verifiable multi-secret sharing
    Dehkordi, Massoud Hadian
    Mashhadi, Samaneh
    [J]. COMPUTER STANDARDS & INTERFACES, 2008, 30 (03) : 187 - 190
  • [7] Round-optimal and efficient verifiable secret sharing
    Fitzi, Matthias
    Garay, Juan
    Gollakota, Shyamnath
    Rangan, C. Pandu
    Srinathan, Karman
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 329 - 342
  • [8] Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation
    Arpita Patra
    Ashish Choudhury
    C. Pandu Rangan
    [J]. Journal of Cryptology, 2015, 28 : 49 - 109
  • [9] Verifiable Secret Sharing with Comprehensive and Efficient Public Verification
    Peng, Kun
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXV, 2011, 6818 : 217 - 230