Outsourced cheating detection for secret sharing

被引:0
|
作者
Cianciullo, Louis [1 ]
Ghodosi, Hossein [1 ]
机构
[1] James Cook Univ, Townsville, Qld 4811, Australia
关键词
Secret sharing; Cheating detection; AMD codes; Outsourced;
D O I
10.1007/s10207-021-00538-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a secret sharing scheme, a dealer, D, distributes shares of a secret, S among a set of n participants, such that only authorised subsets of these participants can reconstruct S, by pooling their shares. Unauthorised subsets should gain no information. An extensively researched area within this field is how to cope with participants who arbitrarily modify their shares (i.e. cheaters). A secret sharing scheme with cheating detection capabilities (SSCD) allows participants to detect cheating upon reconstruction time. The most common way of achieving this is to utilise an algebraic manipulation detection (AMD) code alongside a secret sharing scheme. The dealer essentially encodes S in an AMD code and distributes this code to participants. Participants then reconstruct the code and use this to detect cheating. The problem with this approach is that even if cheating is detected, the cheaters still get the secret. To overcome this problem, we propose a new protocol: outsourced SSCD (OSSCD). Our proposed protocol utilises the same techniques as SSCD; however, before the secret is reconstructed, we have participants distribute their shares among a set of special validation servers. These validation servers then perform a public computation to determine if cheating has occurred. They do this without reconstructing S. The result of this is that if cheating has occurred, the servers can halt the protocol, ensuring no one learns the secret. We present two efficient constructions of our proposed OSSCD protocol: one capable of detecting cheating with high probability and the other capable of tolerating many secrets simultaneously.
引用
收藏
页码:871 / 878
页数:8
相关论文
共 50 条
  • [41] A Cheating Model for Cellular Automata-Based Secret Sharing Schemes
    Jafarpour, Borna
    Nematzadeh, Azadeh
    Kazempour, Vahid
    Sadeghian, Babak
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 25, 2007, 25 : 306 - +
  • [42] A Ramp Threshold Secret Sharing Scheme against Cheating by Substitution Attacks
    Nakamura, Wataru
    Yamamoto, Hirosuke
    Chan, Terence
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 340 - 344
  • [43] Cheating identifiable secret sharing scheme using symmetric bivariate polynomial
    Liu, Yanxiao
    Yang, Chingnung
    Wang, Yichuan
    Zhu, Lei
    Ji, Wenjiang
    [J]. INFORMATION SCIENCES, 2018, 453 : 21 - 29
  • [44] Cheating identifiable (k, n) threshold quantum secret sharing scheme
    Chenhong Yan
    Zhihui Li
    Lu Liu
    Dianjun Lu
    [J]. Quantum Information Processing, 2022, 21
  • [45] Cheating identifiable polynomial based secret sharing scheme for audio and image
    Guttikonda Prashanti
    Mundukur Nirupama Bhat
    [J]. Multimedia Tools and Applications, 2024, 83 : 403 - 423
  • [46] On constructing 1-cheating immune secret-sharing functions
    Zhang, WeiGuo
    Sun, Xi
    Yang, JunPo
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2012, 89 (01) : 30 - 34
  • [47] Cheating identifiable (k, n) threshold quantum secret sharing scheme
    Yan, Chenhong
    Li, Zhihui
    Liu, Lu
    Lu, Dianjun
    [J]. QUANTUM INFORMATION PROCESSING, 2022, 21 (01)
  • [48] Improving the propagation characteristics of Boolean function and cheating immune secret sharing
    Zhang, J
    Wen, QY
    [J]. 2004 7TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS 1-3, 2004, : 2389 - 2392
  • [49] Real-time cheating immune secret sharing for remote sensing images
    Shivendra Shivani
    Subhash Chandra Patel
    Vinay Arora
    Bhisham Sharma
    Alireza Jolfaei
    Gautam Srivastava
    [J]. Journal of Real-Time Image Processing, 2021, 18 : 1493 - 1508
  • [50] A Cheating-Detectable (k, L, n) Ramp Secret Sharing Scheme
    Nakamura, Wataru
    Yamamoto, Hirosuke
    Chan, Terence
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (12) : 2709 - 2719