Unconditionally non-interactive verifiable secret sharing secure against faulty majorities in the commodity based model

被引:0
|
作者
Nascimento, ACA
Mueller-Quade, J
Otsuka, A
Hanaoka, G
Imai, H
机构
[1] Univ Tokyo, Inst Ind Sci, Meguro Ku, Tokyo 1538505, Japan
[2] Univ Karlsruhe, Inst Algorithmen & Kognit Syst, D-76128 Karlsruhe, Germany
关键词
verifiable secret sharing; pre-distributed data; multiparty protocols;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a non-interactive verifiable secret sharing scheme (VSS) tolerating a dishonest majority based on data predistributed by a trusted authority. As an application of this VSS scheme we present very efficient unconditionally secure multiparty protocols based on predistributed data which generalize two-party computations based on linear predistributed bit commitments. The main results of this paper are a non-interactive VSS where the amount of data which needs to be predistributed to each player depends on the number of tolerable cheaters only, a simplified multiplication protocol for shared values based on predistributed random products, a protocol for fair exchange of secrets based on predistributed data, and non-interactive zero knowledge proofs for arbitrary polynomial relations.
引用
收藏
页码:355 / 368
页数:14
相关论文
共 50 条
  • [31] Non-Interactive and secure outsourcing of PCA-Based face recognition
    Ren, Yanli
    Xu, Xiao
    Feng, Guorui
    Zhang, Xinpeng
    Ren, Yanli (renyanli@shu.edu.cn), 1600, Elsevier Ltd (110):
  • [32] Mobile agent protection based on non-interactive secure function evaluation
    Wu, Jian-Jun
    Gao, Ji
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2004, 38 (07): : 848 - 850
  • [33] A secure non-interactive deniable authentication protocol based on discrete logarithms
    Chuang, Yu-Hao
    Shu, Wesley
    Hsu, Kevin C.
    Hsu, Chien-Lung
    ICIC Express Letters, Part B: Applications, 2012, 3 (03): : 507 - 512
  • [34] Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
    Dowsley, Rafael
    Mueller-Quade, Joern
    Otsuka, Akira
    Hanaoka, Goichiro
    Imai, Hideki
    Nascimento, Anderson C. A.
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (02) : 725 - 734
  • [35] A new probabilistic ID-based non-interactive key sharing scheme
    Murakami, Y
    Sakai, R
    Kasahara, M
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2000, E83A (01) : 2 - 9
  • [36] Provably secure verifiable multi-stage secret sharing scheme based on monotone span program
    Mashhadi, Samaneh
    Dehkordi, Massoud Hadian
    Kiamari, Niloofar
    IET INFORMATION SECURITY, 2017, 11 (06) : 326 - 331
  • [37] A secure non-interactive chaotic maps-based deniable authentication scheme with privacy protection in standard model
    Zhu H.
    Zhang Y.
    Journal of Computers (Taiwan), 2018, 29 (03) : 109 - 120
  • [38] A Secure Non-interactive Deniable Authentication Protocol with Certificates Based on Elliptic Curve Cryptography
    Chuang, Yu-Hao
    Hsu, Chien-Lung
    Shu, Wesley
    Hsu, Kevin C.
    Liao, Min-Wen
    NEW TRENDS IN INTELLIGENT INFORMATION AND DATABASE SYSTEMS, 2015, 598 : 183 - 190
  • [39] Game-based security proofs for verifiable secret sharing schemes in the standard model
    Mashhadi, Samaneh
    INFORMATION SECURITY JOURNAL, 2023, 32 (03): : 163 - 172
  • [40] Distillation of unconditionally-secure secret-key against active adversaries based on smooth entropy
    Yang, Bo
    Zhang, Tong
    Wang, Yu-Min
    2001, Chinese Institute of Electronics (29): : 1349 - 1351