Strong (n,t,n) verifiable secret sharing scheme

被引:56
|
作者
Harn, Lein [2 ]
Lin, Changlu [1 ]
机构
[1] Fujian Normal Univ, Key Lab Network Secur & Cryptol, Fuzhou 350007, Fujian, Peoples R China
[2] Univ Missouri, Dept Comp Sci Elect Engn, Kansas City, MO 64110 USA
关键词
Secret sharing; Multiple dealers; t-Consistency; Verifiable secret sharing; SECURE MULTIPARTY COMPUTATION; ROUND COMPLEXITY; EFFICIENT;
D O I
10.1016/j.ins.2010.04.016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A (In) secret sharing divides a secret into n shares in such a way that any t or more than t shares can reconstruct the secret; but fewer than t shares cannot reconstruct the secret. In this paper, we extend the idea of a (t, n) secret sharing scheme and give a formal definition on the (n,t,n) secret sharing scheme based on Pedersen's (t, n) secret sharing scheme. We will show that the (t, a) verifiable secret sharing (VSS) scheme proposed by Benaloh can only ensure that all shares are t-consistent (i.e. any subset of t shares defines the same secret); but shares may not satisfy the security requirements of a (Its) secret sharing scheme. Then, we introduce new notions of strong t-consistency and strong VSS. A strong VSS can ensure that (a) all shares are t-consistent, and (b) all shares satisfy the security requirements of a secret sharing scheme. We propose a strong (n,t,n) VSS based on Benaloh's VSS. We also prove that our proposed (n,t,n) VSS satisfies the definition of a strong VSS. (C) 2010 Elsevier Inc. All rights reserved.
引用
下载
收藏
页码:3059 / 3064
页数:6
相关论文
共 50 条
  • [1] A (n, t, n) Verifiable Multi-secret Sharing Scheme with Secure Secret Reconstruction
    Meng, Li
    Qu Shaoyun
    Xun Tiantian
    Jia, Yu
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 191 - 204
  • [2] Polynomial differential-based strong (n, t, n)-verifiable secret sharing
    Al Mahmoud, Qassim
    IET INFORMATION SECURITY, 2013, 7 (04) : 312 - 317
  • [3] A Verifiable (t, n) Multiple Secret Sharing Scheme and Its Analyses
    Pang, Liaojun
    Le, Huixian
    Yao, Ye
    Wang, Yumin
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 22 - +
  • [4] A novel approach for verifiable (n, n) audio secret sharing scheme
    Bharti, Shambhu Shankar
    Gupta, Manish
    Agarwal, Suneeta
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (19) : 25629 - 25657
  • [5] A novel approach for verifiable (n, n) audio secret sharing scheme
    Shambhu Shankar Bharti
    Manish Gupta
    Suneeta Agarwal
    Multimedia Tools and Applications, 2018, 77 : 25629 - 25657
  • [6] A Verifiable (n, n) Secret Image Sharing Scheme Using XOR Operations
    Chattopadhyay, Arup Kumar
    Ghosh, Debalina
    Maitra, Paramita
    Nag, Amitava
    Saha, Himadri Nath
    2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 1025 - 1031
  • [7] A secure and efficient (t, n) threshold verifiable multi-secret sharing scheme
    Huang, MJ
    Zhang, JZ
    Xie, SC
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 532 - 537
  • [8] An efficient verifiable (t,n)-threshold secret image sharing scheme with ultralight shares
    Chattopadhyay, Arup Kumar
    Nag, Amitava
    Singh, Jyoti Prakash
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (24) : 34969 - 34999
  • [9] Verifiable (t, n) Threshold Secret Sharing Scheme Using ECC Based Signcryption
    Basu, Atanu
    Sengupta, Indranil
    INFORMATION SYSTEMS, TECHNOLOGY AND MANAGEMENT, PROCEEDINGS, 2010, 54 : 133 - 144
  • [10] An efficient verifiable (t,n)-threshold secret image sharing scheme with ultralight shares
    Arup Kumar Chattopadhyay
    Amitava Nag
    Jyoti Prakash Singh
    Multimedia Tools and Applications, 2022, 81 : 34969 - 34999