Flaws in some secret sharing schemes against cheating

被引:0
|
作者
Araki, Toshinori
Obana, Satoshi
机构
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we point out flaws in existing secret sharing schemes against cheating. Namely, we show that a scheme proposed by Ghodosi and Pieprzyk presented at ACISP 2000 and a one by Obana and Araki presented at Asiacrypt 2006 are both insecure against single cheater. We further show that the scheme by Obana et al. can be made secure by slight modification.
引用
收藏
页码:122 / 132
页数:11
相关论文
共 50 条
  • [31] On secret sharing schemes
    Blundo, C
    De Santis, A
    Vaccaro, U
    [J]. INFORMATION PROCESSING LETTERS, 1998, 65 (01) : 25 - 32
  • [32] On secret reconstruction in secret sharing schemes
    Wang, Huaxiong
    Wong, Duncan S.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (01) : 473 - 480
  • [33] Self-authentication Model to Prevent Cheating Issues in Grayscale Visual Secret Sharing Schemes
    Selva Mary, G.
    Blesswin, A. John
    Kumar, S. Manoj
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 125 (02) : 1695 - 1714
  • [34] Self-authentication Model to Prevent Cheating Issues in Grayscale Visual Secret Sharing Schemes
    G. Selva Mary
    A. John Blesswin
    S. Manoj Kumar
    [J]. Wireless Personal Communications, 2022, 125 : 1695 - 1714
  • [35] Cheating-Immune Secret Sharing Schemes from Maiorana-McFarland Boolean Functions
    dela Cruz, Romar B.
    Ol, Say
    [J]. INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 233 - 247
  • [36] Cheating Immune Threshold Visual Secret Sharing
    De Prisco, Roberto
    De Santis, Alfredo
    [J]. COMPUTER JOURNAL, 2010, 53 (09): : 1485 - 1496
  • [37] Visual secret sharing with cheating prevention revisited
    Chen, Yu-Chi
    Tsai, Du-Shiau
    Horng, Gwoboa
    [J]. DIGITAL SIGNAL PROCESSING, 2013, 23 (05) : 1496 - 1504
  • [38] Note on Some Recent Cheater Identifiable Secret Sharing Schemes
    Xu, Rui
    Morozov, Kirill
    Takagi, Tsuyoshi
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (08) : 1814 - 1819
  • [39] Constructions of some secret sharing schemes based on linear codes
    Ratseev, S. M.
    [J]. IZVESTIYA OF SARATOV UNIVERSITY MATHEMATICS MECHANICS INFORMATICS, 2024, 24 (03): : 330 - 341
  • [40] Further Results of Cheating Immune Secret Sharing
    ZHANG Jie~(1
    2.State Key Laboratory of Information Security
    [J]. The Journal of China Universities of Posts and Telecommunications, 2004, (04) : 26 - 28