Two Optimum Secret Sharing Schemes Revisited

被引:1
|
作者
Cao, Zhengjun [1 ,2 ]
Markowitch, Olivier [1 ,2 ]
机构
[1] Univ Libre Bruxelles, Dept Comp Sci, Brussels, Belgium
[2] Shanghai Univ, Dept Math, Shanghai 200041, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1109/FITME.2008.95
中图分类号
F [经济];
学科分类号
02 ;
摘要
In 2006, Obana et al proposed two optimum secret sharing schemes secure against cheating. They extend the secret s in the Shamir's scheme to an array of three elements, (s, e(0), e(1)), and construct two equations for checking validity. Each item in the equations should be reconstructed using Lagrange's interpolation. In this paper we revisit these schemes by introducing a public hash function to construct equations for checking validity The revisited schemes become more efficient because they only extend the secret to an array of two elements. The new scheme for a single secret saves about 1/3 cost of the original.
引用
收藏
页码:157 / +
页数:2
相关论文
共 50 条
  • [21] Rational secret sharing, revisited
    Gordon, S. Dov
    Katz, Jonathan
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2006, 4116 : 229 - 241
  • [22] Strongly Secure Ramp Secret Sharing Schemes from Any Linear Secret Sharing Schemes
    Eriguchi, Reo
    Kunihiro, Noboru
    2019 IEEE INFORMATION THEORY WORKSHOP (ITW), 2019, : 264 - 268
  • [23] Attacks to some verifiable multi-secret sharing schemes and two improved schemes
    Liu, Yanhong
    Zhang, Futai
    Zhang, Jie
    INFORMATION SCIENCES, 2016, 329 : 524 - 539
  • [24] Visual secret sharing schemes for plural secret images
    Iwamoto, M
    Yamamoto, H
    2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 2003, : 283 - 283
  • [25] Visual Two-Secret Sharing Schemes by Different Superimposition Positions
    Li, Yi Hao
    Shyu, Shyong Jian
    DIGITAL-FORENSICS AND WATERMARKING, IWDW 2014, 2015, 9023 : 350 - 363
  • [26] Verifiable Secret Redistribution for Proactive Secret Sharing Schemes
    于佳
    孔凡玉
    李大兴
    Journal of Shanghai Jiaotong University(Science), 2006, (02) : 236 - 241
  • [27] Security of Selected Secret Sharing Schemes
    Ogiela, Urszula
    Takizawa, Makoto
    Ogiela, Lidia
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2017, 2018, 612 : 395 - 400
  • [28] On general perfect secret sharing schemes
    Blakley, GR
    Kabatianski, GA
    ADVANCES IN CRYPTOLOGY - CRYPTO '95, 1995, 963 : 367 - 371
  • [29] Fully dynamic secret sharing schemes
    Universita di Salerno, Baronissi, Italy
    Theor Comput Sci, 2 (407-440):
  • [30] Strongly ideal secret sharing schemes
    Phillips, Steven J.
    Phillips, Nicholas C.
    Journal of Cryptology, 1992, 5 (03) : 185 - 191