Strong (n,t,n) verifiable secret sharing scheme

被引:56
|
作者
Harn, Lein [2 ]
Lin, Changlu [1 ]
机构
[1] Fujian Normal Univ, Key Lab Network Secur & Cryptol, Fuzhou 350007, Fujian, Peoples R China
[2] Univ Missouri, Dept Comp Sci Elect Engn, Kansas City, MO 64110 USA
关键词
Secret sharing; Multiple dealers; t-Consistency; Verifiable secret sharing; SECURE MULTIPARTY COMPUTATION; ROUND COMPLEXITY; EFFICIENT;
D O I
10.1016/j.ins.2010.04.016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A (In) secret sharing divides a secret into n shares in such a way that any t or more than t shares can reconstruct the secret; but fewer than t shares cannot reconstruct the secret. In this paper, we extend the idea of a (t, n) secret sharing scheme and give a formal definition on the (n,t,n) secret sharing scheme based on Pedersen's (t, n) secret sharing scheme. We will show that the (t, a) verifiable secret sharing (VSS) scheme proposed by Benaloh can only ensure that all shares are t-consistent (i.e. any subset of t shares defines the same secret); but shares may not satisfy the security requirements of a (Its) secret sharing scheme. Then, we introduce new notions of strong t-consistency and strong VSS. A strong VSS can ensure that (a) all shares are t-consistent, and (b) all shares satisfy the security requirements of a secret sharing scheme. We propose a strong (n,t,n) VSS based on Benaloh's VSS. We also prove that our proposed (n,t,n) VSS satisfies the definition of a strong VSS. (C) 2010 Elsevier Inc. All rights reserved.
引用
下载
收藏
页码:3059 / 3064
页数:6
相关论文
共 50 条
  • [21] An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme
    Chang, TY
    Hwang, MS
    Yang, WP
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 163 (01) : 169 - 178
  • [22] Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme
    Wang, Na
    Cai, Yuanyuan
    Fu, Junsong
    Chen, Xiqi
    IEEE ACCESS, 2020, 8 : 20799 - 20804
  • [23] Verifiable (2, n) Image Secret Sharing Scheme Using Sudoku Matrix
    Chen, Yi-Hui
    Lee, Jia-Ye
    Chiang, Min-Hsien
    Chen, Shih-Hsin
    SYMMETRY-BASEL, 2022, 14 (07):
  • [24] A Fair (t,n) Threshold Secret Sharing Scheme
    Xing, Minhong
    Li, Wenmin
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENT COMMUNICATION, 2015, 16 : 140 - 143
  • [25] A New (t, n)-Threshold Secret Sharing Scheme
    Tang, Chunming
    Yao, Zheng-an
    2008 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING, 2008, : 920 - +
  • [26] A (t, n) multi-secret sharing scheme
    Yang, CC
    Chang, TY
    Hwang, MS
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 151 (02) : 483 - 490
  • [27] A scheme for (t, n) threshold secret image sharing
    Chan, Chao-Wen
    Chang, Thin-Chen
    IMECS 2006: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, 2006, : 619 - +
  • [28] Fair (t, n) threshold secret sharing scheme
    Tian, Youliang
    Ma, Jianfeng
    Peng, Changgen
    Jiang, Qi
    IET INFORMATION SECURITY, 2013, 7 (02) : 106 - 112
  • [29] A (t, n) secret sharing scheme for image encryption
    Shi Runhua
    Zhong Hong
    Huang Liusheng
    Luo Yonglong
    CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 3, PROCEEDINGS, 2008, : 3 - +
  • [30] LWE-based verifiable essential secret image sharing scheme ((t,s,k,n) - VESIS)
    Dehkordi, Massoud Hadian
    Farahi, Seyed Taghi
    Mashhadi, Samaneh
    IET IMAGE PROCESSING, 2024, 18 (04) : 1053 - 1072