Strong (n,t,n) verifiable secret sharing scheme

被引:56
|
作者
Harn, Lein [2 ]
Lin, Changlu [1 ]
机构
[1] Fujian Normal Univ, Key Lab Network Secur & Cryptol, Fuzhou 350007, Fujian, Peoples R China
[2] Univ Missouri, Dept Comp Sci Elect Engn, Kansas City, MO 64110 USA
关键词
Secret sharing; Multiple dealers; t-Consistency; Verifiable secret sharing; SECURE MULTIPARTY COMPUTATION; ROUND COMPLEXITY; EFFICIENT;
D O I
10.1016/j.ins.2010.04.016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A (In) secret sharing divides a secret into n shares in such a way that any t or more than t shares can reconstruct the secret; but fewer than t shares cannot reconstruct the secret. In this paper, we extend the idea of a (t, n) secret sharing scheme and give a formal definition on the (n,t,n) secret sharing scheme based on Pedersen's (t, n) secret sharing scheme. We will show that the (t, a) verifiable secret sharing (VSS) scheme proposed by Benaloh can only ensure that all shares are t-consistent (i.e. any subset of t shares defines the same secret); but shares may not satisfy the security requirements of a (Its) secret sharing scheme. Then, we introduce new notions of strong t-consistency and strong VSS. A strong VSS can ensure that (a) all shares are t-consistent, and (b) all shares satisfy the security requirements of a secret sharing scheme. We propose a strong (n,t,n) VSS based on Benaloh's VSS. We also prove that our proposed (n,t,n) VSS satisfies the definition of a strong VSS. (C) 2010 Elsevier Inc. All rights reserved.
引用
下载
收藏
页码:3059 / 3064
页数:6
相关论文
共 50 条
  • [31] A verifiable essential secret image sharing scheme based on HLRs (VESIS-(t, s, k, n))
    Dehkordi, Massoud Hadian
    Farahi, Seyed Taghi
    Mashhadi, Samaneh
    CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2024, 9 (02) : 388 - 410
  • [32] Verifiable quantum (k, n)-threshold secret sharing
    Yang, Yu-Guang
    Jia, Xin
    Wang, Hong-Yang
    Zhang, Hua
    QUANTUM INFORMATION PROCESSING, 2012, 11 (06) : 1619 - 1625
  • [33] Verifiable quantum (k, n)-threshold secret sharing
    Yu-Guang Yang
    Xin Jia
    Hong-Yang Wang
    Hua Zhang
    Quantum Information Processing, 2012, 11 : 1619 - 1625
  • [34] A(t, m, n)-Group Oriented Secret Sharing Scheme
    MIAO Fuyou
    FAN Yuanyuan
    WANG Xingfu
    XIONG Yan
    Moaman Badawy
    Chinese Journal of Electronics, 2016, 25 (01) : 174 - 178
  • [35] UNCONDITIONALLY SECURE FAIR (t, n)-SECRET SHARING SCHEME
    Al Mahmoud, Qassim
    Besoul, Khaldoun
    Alhalaybeh, Ayman
    ADVANCES AND APPLICATIONS IN DISCRETE MATHEMATICS, 2023, 38 (01): : 127 - 143
  • [36] (t,n) secret sharing scheme based on the LUC cryptosystem
    Pang, Liao-Jun
    Wang, Yu-Min
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2005, 32 (06): : 927 - 930
  • [37] An efficient (t,n)-threshold secret image sharing scheme
    Kanso, Ali
    Ghebleh, Mohammad
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (15) : 16369 - 16388
  • [38] A (t, n) Threshold Quantum Secret Sharing Scheme with Fairness
    Fulin Li
    Tingyan Chen
    Shixin Zhu
    International Journal of Theoretical Physics, 62
  • [39] AN EFFICIENT AND SECURE (t, n) THRESHOLD SECRET SHARING SCHEME
    Pang Liaojun Sun Xi Wang Yumin The National Key Lab of Integrated Service Networks Xidian Univ Xian China
    JournalofElectronics, 2006, (05) : 731 - 735
  • [40] Comments on 'Fair (t, n) threshold secret sharing scheme'
    Harn, Lein
    IET INFORMATION SECURITY, 2014, 8 (06) : 303 - 304