Outsourced cheating detection for secret sharing

被引:0
|
作者
Cianciullo, Louis [1 ]
Ghodosi, Hossein [1 ]
机构
[1] James Cook Univ, Townsville, Qld 4811, Australia
关键词
Secret sharing; Cheating detection; AMD codes; Outsourced;
D O I
10.1007/s10207-021-00538-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a secret sharing scheme, a dealer, D, distributes shares of a secret, S among a set of n participants, such that only authorised subsets of these participants can reconstruct S, by pooling their shares. Unauthorised subsets should gain no information. An extensively researched area within this field is how to cope with participants who arbitrarily modify their shares (i.e. cheaters). A secret sharing scheme with cheating detection capabilities (SSCD) allows participants to detect cheating upon reconstruction time. The most common way of achieving this is to utilise an algebraic manipulation detection (AMD) code alongside a secret sharing scheme. The dealer essentially encodes S in an AMD code and distributes this code to participants. Participants then reconstruct the code and use this to detect cheating. The problem with this approach is that even if cheating is detected, the cheaters still get the secret. To overcome this problem, we propose a new protocol: outsourced SSCD (OSSCD). Our proposed protocol utilises the same techniques as SSCD; however, before the secret is reconstructed, we have participants distribute their shares among a set of special validation servers. These validation servers then perform a public computation to determine if cheating has occurred. They do this without reconstructing S. The result of this is that if cheating has occurred, the servers can halt the protocol, ensuring no one learns the secret. We present two efficient constructions of our proposed OSSCD protocol: one capable of detecting cheating with high probability and the other capable of tolerating many secrets simultaneously.
引用
收藏
页码:871 / 878
页数:8
相关论文
共 50 条
  • [1] Outsourced cheating detection for secret sharing
    Louis Cianciullo
    Hossein Ghodosi
    [J]. International Journal of Information Security, 2021, 20 : 871 - 878
  • [3] Almost Optimum Secret Sharing with Cheating Detection
    Jhanwar, Mahabir Prasad
    Safavi-Naini, Reihaneh
    [J]. SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING (SPACE 2015), 2015, 9354 : 359 - 372
  • [4] Secret Sharing Scheme with Efficient Cheating Detection
    Becerra, Daniel
    Vega, Gerardo
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON NETWORKING, INFORMATION SYSTEMS & SECURITY (NISS19), 2019,
  • [5] CHEATING DETECTION AND CHEATER IDENTIFICATION IN SECRET SHARING SCHEMES
    WU, TC
    WU, TS
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1995, 142 (05): : 367 - 369
  • [6] Improvements to Almost Optimum Secret Sharing with Cheating Detection
    Cianciullo, Louis
    Ghodosi, Hossein
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2018, 2018, 11049 : 193 - 205
  • [7] On cheating immune secret sharing
    Pieprzyk, J
    Zhang, XM
    [J]. DISCRETE MATHEMATICS AND THEORETICAL COMPUTER SCIENCE, 2004, 6 (02): : 253 - 264
  • [8] Cheating Resistance for Secret Sharing
    Chan, Chao-Wen
    Chang, Chin-Chen
    Wang, Zhi-Hui
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 840 - +
  • [9] Linear (k,n) secret sharing scheme with cheating detection
    Liu, Yanxiao
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2115 - 2121
  • [10] Linear (k, n) secret sharing scheme with cheating detection
    Liu, Yan-xiao
    Wang, Zhi-xiao
    Yan, Wen-yao
    [J]. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1943 - 1948