Flaws in some secret sharing schemes against cheating

被引:0
|
作者
Araki, Toshinori
Obana, Satoshi
机构
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we point out flaws in existing secret sharing schemes against cheating. Namely, we show that a scheme proposed by Ghodosi and Pieprzyk presented at ACISP 2000 and a one by Obana and Araki presented at Asiacrypt 2006 are both insecure against single cheater. We further show that the scheme by Obana et al. can be made secure by slight modification.
引用
收藏
页码:122 / 132
页数:11
相关论文
共 50 条
  • [21] Cheating-immune secret sharing schemes from codes and cumulative arrays
    Romar dela Cruz
    Huaxiong Wang
    [J]. Cryptography and Communications, 2013, 5 : 67 - 83
  • [22] Almost Optimum Secret Sharing Schemes with Cheating Detection for Random Bit Strings
    Hoshino, Hidetaka
    Obana, Satoshi
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 213 - 222
  • [23] A Ramp Threshold Secret Sharing Scheme against Cheating by Substitution Attacks
    Nakamura, Wataru
    Yamamoto, Hirosuke
    Chan, Terence
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 340 - 344
  • [24] Efficient (k,n)Threshold secret sharing schemes secure against cheating from n-1 cheaters
    Araki, Toshinori
    [J]. Information Security and Privacy, Proceedings, 2007, 4586 : 133 - 142
  • [25] Robust Secret Sharing Schemes Against Local Adversaries
    Bishop, Allison
    Pastro, Valerio
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT II, 2016, 9615 : 327 - 356
  • [26] Strictly cheating immune secret sharing
    Zhang, J
    Wen, QY
    [J]. ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 514 - 519
  • [27] Cheating prevention in linear secret sharing
    Pieprzyk, J
    Zhang, XM
    [J]. INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 121 - 135
  • [28] Outsourced cheating detection for secret sharing
    Cianciullo, Louis
    Ghodosi, Hossein
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (06) : 871 - 878
  • [29] Outsourced cheating detection for secret sharing
    Louis Cianciullo
    Hossein Ghodosi
    [J]. International Journal of Information Security, 2021, 20 : 871 - 878
  • [30] The access structure of some secret-sharing schemes
    Renvall, A
    Ding, CS
    [J]. INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 67 - 78