Cheating identifiable secret sharing scheme using symmetric bivariate polynomial

被引:47
|
作者
Liu, Yanxiao [1 ]
Yang, Chingnung [2 ]
Wang, Yichuan [1 ]
Zhu, Lei [1 ]
Ji, Wenjiang [1 ]
机构
[1] Xian Univ Technol, Dept Comp Sci & Engn, Xian 710048, Shaanxi, Peoples R China
[2] Natl Dong Hwa Univ, Dept CSIE, Shoufeng Township, Hualien County, Taiwan
基金
中国国家自然科学基金;
关键词
Secret sharing; Cheating identification; Bivariate polynomial; Symmetry; ROUND COMPLEXITY; SECURE;
D O I
10.1016/j.ins.2018.04.043
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In (k, n) secret sharing scheme, any m out of the n users (m >= k) can reconstruct the secret and any less than k users cannot get any information on the secret. However, some cheaters can submit fake shares to fool other honest users during secret reconstruction. Cheating identification is an important technical to prevent such cheating behavior. In this paper, we consider cheating problem in bivariate polynomial based secret sharing scheme, and propose two cheating identification algorithms respectively. The first algorithm can identify cheaters by the m users who participate in secret reconstruction; the second algorithm can achieves stronger capability of cheater identification with the collaboration of the rest n - m users who are not involved in secret reconstruction. In our scheme, the cheating identification is only based on the symmetry property of bivariate polynomial and linearity of interpolated polynomial. Both the two algorithms are efficient with respect of cheater identification capabilities. (C) 2018 Elsevier Inc. All rights reserved.
引用
收藏
页码:21 / 29
页数:9
相关论文
共 50 条
  • [21] Optimum secret sharing scheme secure against cheating
    Ogata, W
    Kurosawa, K
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 200 - 211
  • [22] AN EFFICIENT AND INFORMATION THEORETICALLY SECURE RATIONAL SECRET SHARING SCHEME BASED ON SYMMETRIC BIVARIATE POLYNOMIALS
    Tartary, Christophe
    Wang, Huaxiong
    Zhang, Yun
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2011, 22 (06) : 1395 - 1416
  • [23] Computationally Secure Cheating Identifiable Multi-Secret Sharing for General Access Structure
    Roy, Partha Sarathi
    Das, Angsuman
    Adhikari, Avishek
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2015, 2015, 8956 : 278 - 287
  • [24] Bivariate polynomial-based secret sharing schemes with secure secret reconstruction
    Ding, Jian
    Ke, Pinhui
    Lin, Changlu
    Wang, Huaxiong
    INFORMATION SCIENCES, 2022, 593 : 398 - 414
  • [25] A Secret Sharing Shuffling Scheme Based on Polynomial
    Zhang, Xi
    Zhang, Lei
    Zhang, Quan
    Tang, Chaojing
    2008 INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, VOLS 1-4, 2008, : 1746 - 1750
  • [26] Cheating on a Visual Secret Sharing Scheme under a Realistic Scenario
    Lumyong, Pichanee
    Iwamoto, Mitsugu
    Ohta, Kazuo
    2014 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA), 2014, : 575 - 579
  • [27] Efficient Secret Image Sharing Scheme with Authentication and Cheating Prevention
    Zhang, Lina
    Dang, Xuan
    Feng, Li
    Yang, Junhan
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2021, 2021
  • [28] Linear (k,n) secret sharing scheme with cheating detection
    Liu, Yanxiao
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2115 - 2121
  • [29] A new efficient and secure secret reconstruction scheme (SSRS) with verifiable shares based on a symmetric bivariate polynomial
    Hsu, Chingfang
    Harn, Lein
    Wu, Shan
    Ke, Lulu
    Mobile Information Systems, 2020, 2020
  • [30] A New Efficient and Secure Secret Reconstruction Scheme (SSRS) with Verifiable Shares Based on a Symmetric Bivariate Polynomial
    Hsu, Chingfang
    Harn, Lein
    Wu, Shan
    Ke, Lulu
    MOBILE INFORMATION SYSTEMS, 2020, 2020