A Cellular Automata Based Verifiable Multi-secret Sharing Scheme Without a Trusted Dealer

被引:8
|
作者
Li Meng [1 ]
Yu Jia [1 ,2 ]
Hao Rong [1 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[2] Shandong Prov Key Lab Comp Network, Jinan 250014, Peoples R China
基金
中国国家自然科学基金;
关键词
Multi-secret sharing; Verifiability; Trusted dealer; Cellular automata; Hash function;
D O I
10.1049/cje.2017.01.026
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We proposed a verifiable multi-secret sharing scheme without a dealer. We use cellular automata, having the properties of linear computations and parallel computations, to construct our scheme. The linear computational property makes it possible to build a scheme without the assistance of a trusted dealer, and the parallel computational property contributes to the high efficiency of the scheme. Hash function is used to realize the verification of shares, which also makes our scheme more efficient. The security of the scheme is also analyzed.
引用
收藏
页码:313 / 318
页数:6
相关论文
共 50 条
  • [1] A Cellular Automata Based Verifiable Multi-secret Sharing Scheme Without a Trusted Dealer
    LI Meng
    YU Jia
    HAO Rong
    [J]. Chinese Journal of Electronics, 2017, 26 (02) : 313 - 318
  • [2] A verifiable multi-secret sharing scheme based on cellular automata
    Eslami, Z.
    Ahmadabadi, J. Zarepour
    [J]. INFORMATION SCIENCES, 2010, 180 (15) : 2889 - 2894
  • [3] Multi-secret sharing scheme based on cellular automata
    Institute of Hydropower System and Hydroinformatics, Dalian Univ. of Tech, Dalian 116024, China
    不详
    不详
    [J]. Xitong Gongcheng Lilum yu Shijian, 2006, 6 (113-116):
  • [4] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    [J]. INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138
  • [5] Verifiable Rational Multi-secret Sharing Scheme
    Cai, Yongquan
    Luo, Zhanhai
    Yang, Yi
    [J]. INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 : 42 - 48
  • [6] A verifiable multi-secret sharing scheme (VMSS)
    Pang Liaojun
    Li Huixian
    Jiao Licheng
    Wang Yumin
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 749 - +
  • [7] On Novel Verifiable Multi-Secret Sharing Scheme
    Wang, Jian
    Liu, Yanheng
    Wang, Yanxi
    [J]. ADVANCED SCIENCE LETTERS, 2011, 4 (11-12) : 3709 - 3715
  • [8] Verifiable threshold multi-secret sharing scheme
    Pang, Liao-Jun
    Li, Hui-Xian
    Li, Zhi-Jie
    Wang, Yu-Min
    [J]. Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2008, 40 (09): : 1462 - 1465
  • [9] A practical verifiable multi-secret sharing scheme
    Zhao, Jianjie
    Zhang, Jianzhong
    Zhao, Rong
    [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) : 138 - 141
  • [10] Verifiable multi-secret sharing scheme based on S-multiplication
    He, MX
    Fan, PZ
    Kaderali, F
    [J]. WAVELET ANALYSIS AND ITS APPLICATIONS, AND ACTIVE MEDIA TECHNOLOGY, VOLS 1 AND 2, 2004, : 602 - 608