Cheating identifiable secret sharing scheme using symmetric bivariate polynomial

被引:46
|
作者
Liu, Yanxiao [1 ]
Yang, Chingnung [2 ]
Wang, Yichuan [1 ]
Zhu, Lei [1 ]
Ji, Wenjiang [1 ]
机构
[1] Xian Univ Technol, Dept Comp Sci & Engn, Xian 710048, Shaanxi, Peoples R China
[2] Natl Dong Hwa Univ, Dept CSIE, Shoufeng Township, Hualien County, Taiwan
基金
中国国家自然科学基金;
关键词
Secret sharing; Cheating identification; Bivariate polynomial; Symmetry; ROUND COMPLEXITY; SECURE;
D O I
10.1016/j.ins.2018.04.043
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In (k, n) secret sharing scheme, any m out of the n users (m >= k) can reconstruct the secret and any less than k users cannot get any information on the secret. However, some cheaters can submit fake shares to fool other honest users during secret reconstruction. Cheating identification is an important technical to prevent such cheating behavior. In this paper, we consider cheating problem in bivariate polynomial based secret sharing scheme, and propose two cheating identification algorithms respectively. The first algorithm can identify cheaters by the m users who participate in secret reconstruction; the second algorithm can achieves stronger capability of cheater identification with the collaboration of the rest n - m users who are not involved in secret reconstruction. In our scheme, the cheating identification is only based on the symmetry property of bivariate polynomial and linearity of interpolated polynomial. Both the two algorithms are efficient with respect of cheater identification capabilities. (C) 2018 Elsevier Inc. All rights reserved.
引用
收藏
页码:21 / 29
页数:9
相关论文
共 50 条
  • [1] Cheating identifiable polynomial based secret sharing scheme for audio and image
    Prashanti, Guttikonda
    Bhat, Mundukur Nirupama
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (1) : 403 - 423
  • [2] Cheating identifiable polynomial based secret sharing scheme for audio and image
    Guttikonda Prashanti
    Mundukur Nirupama Bhat
    [J]. Multimedia Tools and Applications, 2024, 83 : 403 - 423
  • [3] Applying cheating identifiable secret sharing scheme in multimedia security
    Zheng Ma
    Yan Ma
    Xiaohong Huang
    Manjun Zhang
    Yanxiao Liu
    [J]. EURASIP Journal on Image and Video Processing, 2020
  • [4] Applying cheating identifiable secret sharing scheme in multimedia security
    Ma, Zheng
    Ma, Yan
    Huang, Xiaohong
    Zhang, Manjun
    Liu, Yanxiao
    [J]. EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING, 2020, 2020 (01)
  • [5] Cheating identifiable (k, n) threshold quantum secret sharing scheme
    Yan, Chenhong
    Li, Zhihui
    Liu, Lu
    Lu, Dianjun
    [J]. QUANTUM INFORMATION PROCESSING, 2022, 21 (01)
  • [6] Cheating identifiable (k, n) threshold quantum secret sharing scheme
    Chenhong Yan
    Zhihui Li
    Lu Liu
    Dianjun Lu
    [J]. Quantum Information Processing, 2022, 21
  • [7] Secret Image Sharing Scheme Based on Bivariate Polynomial
    Tang, Dan
    Huang, Jian
    [J]. 2012 2ND INTERNATIONAL CONFERENCE ON UNCERTAINTY REASONING AND KNOWLEDGE ENGINEERING (URKE), 2012, : 193 - 195
  • [8] Fair quantum secret sharing based on symmetric bivariate polynomial
    Bai, Chen-Ming
    Zhang, Sujuan
    Liu, Lu
    [J]. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2022, 589
  • [9] Changing the Threshold in a Bivariate Polynomial Based Secret Image Sharing Scheme
    Sun, Qindong
    Cao, Han
    Li, Shancang
    Song, Houbing
    Liu, Yanxiao
    [J]. MATHEMATICS, 2022, 10 (05)
  • [10] (t, n) Multi-Secret Sharing Scheme Based on Bivariate Polynomial
    Harn, Lein
    Hsu, Ching-Fang
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (02) : 1495 - 1504