An Attack on a Dynamic Multi-Secret Sharing Scheme And Enhancing Its Security

被引:0
|
作者
Tadayon, M. H.
Khanmohammadi, H.
Arabi, S.
机构
关键词
Dynamic Multi Secret Sharing; Secure Channel; Verifiability; Cheating; Attack;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper we have analysed Zou and Zhang's scheme from the security point of view. An attack is proposed on verifiability and non secure channel in this paper. We have proved that this scheme needs a secure channel although this scheme has been proposed without a secure channel; in addition this scheme is not completely verifiable i.e. although the combiner verifies the scheme but the participants can cheat. Elliptic curves and bilinear maps together with the difficultly of solving discrete logarithm problems, a verifiable secret sharing scheme is proposed. Furthermore the proposed scheme has this property that all participants can select their shares; so the dealer can't cheat on the shares of participants. Security analyses show that our modifications on the proposed scheme solve both of the mentioned problems. In addition our modifications reduce the public values published by the dealer; so we have modified this scheme to an enhanced practical scheme.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] A scheme for threshold multi-secret sharing
    Chan, CW
    Chang, CC
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) : 1 - 14
  • [2] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138
  • [3] A threshold multi-secret sharing scheme
    Shi Runhua
    Huang Liusheng
    Luo yonglong
    Zhong Hong
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1705 - +
  • [4] A fully dynamic multi-secret sharing scheme with redundant authorization
    Fulin Li
    Hang Hu
    Shixin Zhu
    Jiayun Yan
    Cryptography and Communications, 2024, 16 : 3 - 20
  • [5] A fully dynamic multi-secret sharing scheme with redundant authorization
    Li, Fulin
    Hu, Hang
    Zhu, Shixin
    Yan, Jiayun
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2024, 16 (01): : 3 - 20
  • [6] A verifiable multi-secret sharing scheme (VMSS)
    Pang Liaojun
    Li Huixian
    Jiao Licheng
    Wang Yumin
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 749 - +
  • [7] Verifiable Rational Multi-secret Sharing Scheme
    Cai, Yongquan
    Luo, Zhanhai
    Yang, Yi
    INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 : 42 - 48
  • [8] On Novel Verifiable Multi-Secret Sharing Scheme
    Wang, Jian
    Liu, Yanheng
    Wang, Yanxi
    ADVANCED SCIENCE LETTERS, 2011, 4 (11-12) : 3709 - 3715
  • [9] A (t, n) multi-secret sharing scheme
    Yang, CC
    Chang, TY
    Hwang, MS
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 151 (02) : 483 - 490
  • [10] A Hierarchical Threshold Multi-secret Sharing Scheme
    Shi Runhua
    Zhong Hong
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 231 - 234