Unconditionally non-interactive verifiable secret sharing secure against faulty majorities in the commodity based model

被引:0
|
作者
Nascimento, ACA
Mueller-Quade, J
Otsuka, A
Hanaoka, G
Imai, H
机构
[1] Univ Tokyo, Inst Ind Sci, Meguro Ku, Tokyo 1538505, Japan
[2] Univ Karlsruhe, Inst Algorithmen & Kognit Syst, D-76128 Karlsruhe, Germany
关键词
verifiable secret sharing; pre-distributed data; multiparty protocols;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a non-interactive verifiable secret sharing scheme (VSS) tolerating a dishonest majority based on data predistributed by a trusted authority. As an application of this VSS scheme we present very efficient unconditionally secure multiparty protocols based on predistributed data which generalize two-party computations based on linear predistributed bit commitments. The main results of this paper are a non-interactive VSS where the amount of data which needs to be predistributed to each player depends on the number of tolerable cheaters only, a simplified multiplication protocol for shared values based on predistributed random products, a protocol for fair exchange of secrets based on predistributed data, and non-interactive zero knowledge proofs for arbitrary polynomial relations.
引用
收藏
页码:355 / 368
页数:14
相关论文
共 50 条
  • [41] Collusion-attack free ID-based non-interactive key sharing
    Tanaka, Hatsukazu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (06) : 1820 - 1824
  • [42] A Computational Diffie-Hellman-Based Insider Secure Signcryption with Non-interactive Non-repudiation
    Togde, Ngarenon
    Sarr, Augustin P.
    MATHEMATICS AND COMPUTING, ICMC 2022, 2022, 415 : 89 - 101
  • [43] Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves
    Dehkordi, Massoud Hadian
    Mashhadi, Samaneh
    COMPUTER COMMUNICATIONS, 2008, 31 (09) : 1777 - 1784
  • [44] Verifiable Multi-Secret Sharing Based on Non-Homogeneous Linear Recursions Revisited
    Zhang, Ben-Hui
    Tang, Yuan-Sheng
    Chen, Wen-Bing
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 183 - 190
  • [45] Non-Interactive Dealer-Free Dynamic Threshold Secret Sharing Based on Standard Shamir's SS for 5G Networks
    Hsu, Chingfang
    Harn, Lein
    Xia, Zhe
    Zhang, Maoyuan
    IEEE ACCESS, 2020, 8 : 203965 - 203971
  • [46] NVAS: A non-interactive verifiable federated learning aggregation scheme for COVID-19 based on game theory
    Deng, Haitao
    Hu, Jing
    Sharma, Rohit
    Mo, Mingsen
    Ren, Yongjun
    COMPUTER COMMUNICATIONS, 2023, 206 : 1 - 9
  • [47] Polynomial based non-interactive session key computation protocol for secure communication in dynamic groups
    Kumar V.
    Kumar R.
    Pandey S.K.
    International Journal of Information Technology, 2020, 12 (1) : 283 - 288
  • [48] Threshold-Based Post-Quantum Secure Verifiable Multi-Secret Sharing for Distributed Storage Blockchain
    Mesnager, Sihem
    Sinak, Ahmet
    Yayla, Oguz
    MATHEMATICS, 2020, 8 (12) : 1 - 15
  • [49] A Homomorphic Proxy Re-authenticators based Efficient Multi-client Non-interactive Verifiable Computation Scheme
    Xu, Shuaijianni
    Zhang, Liang
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 195 - 206
  • [50] On the Construction and Analysis of Verifiable Multi-secret Sharing Based on Non-homogeneous Linear Recursion
    Zhang, Ben-Hui
    Tang, Yuan-Sheng
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 34 (03) : 749 - 763