Cheating prevention in linear secret sharing

被引:0
|
作者
Pieprzyk, J [1 ]
Zhang, XM [1 ]
机构
[1] Macquarie Univ, Dept Comp, Ctr Adv Comp Algorithms & Cryptog, Sydney, NSW 2109, Australia
来源
关键词
cryptography; secret sharing; linear secret sharing schemes; cheating detection; cheating identification;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cheating detection in linear secret sharing is considered. The model of cheating extends the Tompa-Woll attack and includes cheating during multiple (unsuccessful) recovery of the secret. It is shown that shares in most linear schemes can be split into subshares. Subshares can be used by participants to trade perfectness of the scheme with cheating prevention. Evaluation of cheating prevention is given in the context of different strategies applied by cheaters.
引用
收藏
页码:121 / 135
页数:15
相关论文
共 50 条
  • [1] Visual secret sharing with cheating prevention revisited
    Chen, Yu-Chi
    Tsai, Du-Shiau
    Horng, Gwoboa
    [J]. DIGITAL SIGNAL PROCESSING, 2013, 23 (05) : 1496 - 1504
  • [2] Efficient Secret Image Sharing Scheme with Authentication and Cheating Prevention
    Zhang, Lina
    Dang, Xuan
    Feng, Li
    Yang, Junhan
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2021, 2021
  • [3] Linear (k,n) secret sharing scheme with cheating detection
    Liu, Yanxiao
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2115 - 2121
  • [4] Linear (k, n) secret sharing scheme with cheating detection
    Liu, Yan-xiao
    Wang, Zhi-xiao
    Yan, Wen-yao
    [J]. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1943 - 1948
  • [5] On cheating immune secret sharing
    Pieprzyk, J
    Zhang, XM
    [J]. DISCRETE MATHEMATICS AND THEORETICAL COMPUTER SCIENCE, 2004, 6 (02): : 253 - 264
  • [6] Cheating Resistance for Secret Sharing
    Chan, Chao-Wen
    Chang, Chin-Chen
    Wang, Zhi-Hui
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 840 - +
  • [8] Strictly cheating immune secret sharing
    Zhang, J
    Wen, QY
    [J]. ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 514 - 519
  • [9] Outsourced cheating detection for secret sharing
    Louis Cianciullo
    Hossein Ghodosi
    [J]. International Journal of Information Security, 2021, 20 : 871 - 878
  • [10] Outsourced cheating detection for secret sharing
    Cianciullo, Louis
    Ghodosi, Hossein
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (06) : 871 - 878