On cheating immune secret sharing

被引:0
|
作者
Pieprzyk, J [1 ]
Zhang, XM [1 ]
机构
[1] Macquarie Univ, Dept Comp, Ctr Adv Comp Algorithms & Cryptog, Sydney, NSW 2109, Australia
关键词
secret sharing; cheating prevention; cheating immune;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The paper addresses the cheating prevention in secret sharing. We consider secret sharing with binary shares. The secret also is binary. This model allows us to use results and constructions from the well developed theory of cryptographically strong boolean functions. In particular, we prove that for given secret sharing, the average cheating probability over all cheating vectors and all original vectors, i.e., 1/n.2(-n)Sigma(c)(n)= 1Sigmaalphaepsilonnuetarhoc,alpha, denoted by p ($) over bar, satisfies p ($) over bar greater than or equal to1/ 2, and the equality holds if and only if rhoc,alpha satisfies rhoc,alphaa = 1/2 for every cheating vector delta(c) and every original vector a. In this case the secret sharing is said to be cheating immune. We further establish a relationship between cheating-immune secret sharing and cryptographic criteria of boolean functions. This enables us to construct cheating-immune secret sharing.
引用
收藏
页码:253 / 264
页数:12
相关论文
共 50 条
  • [41] Linear (k, n) secret sharing scheme with cheating detection
    Liu, Yan-xiao
    Wang, Zhi-xiao
    Yan, Wen-yao
    [J]. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1943 - 1948
  • [42] (k,n) secret image sharing scheme capable of cheating detection
    Yan-Xiao Liu
    Qin-Dong Sun
    Ching-Nung Yang
    [J]. EURASIP Journal on Wireless Communications and Networking, 2018
  • [43] Cheating identifiable polynomial based secret sharing scheme for audio and image
    Prashanti, Guttikonda
    Bhat, Mundukur Nirupama
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (1) : 403 - 423
  • [44] A Cheating Model for Cellular Automata-Based Secret Sharing Schemes
    Jafarpour, Borna
    Nematzadeh, Azadeh
    Kazempour, Vahid
    Sadeghian, Babak
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 25, 2007, 25 : 306 - +
  • [45] A Ramp Threshold Secret Sharing Scheme against Cheating by Substitution Attacks
    Nakamura, Wataru
    Yamamoto, Hirosuke
    Chan, Terence
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 340 - 344
  • [46] Cheating identifiable secret sharing scheme using symmetric bivariate polynomial
    Liu, Yanxiao
    Yang, Chingnung
    Wang, Yichuan
    Zhu, Lei
    Ji, Wenjiang
    [J]. INFORMATION SCIENCES, 2018, 453 : 21 - 29
  • [47] Cheating identifiable (k, n) threshold quantum secret sharing scheme
    Chenhong Yan
    Zhihui Li
    Lu Liu
    Dianjun Lu
    [J]. Quantum Information Processing, 2022, 21
  • [48] (k, n) secret image sharing scheme capable of cheating detection
    Liu, Yan-Xiao
    Sun, Qin-Dong
    Yang, Ching-Nung
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
  • [49] Cheating identifiable polynomial based secret sharing scheme for audio and image
    Guttikonda Prashanti
    Mundukur Nirupama Bhat
    [J]. Multimedia Tools and Applications, 2024, 83 : 403 - 423
  • [50] Cheating detection and cheater identification in (t, n) secret sharing scheme
    Wang, Zhixiao
    Liu, Yanxiao
    Yan, Wenyao
    Wei, Wei
    Li, Junhuai
    Zhang, Deyun
    Alfandi, Omar
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2014, 29 (01): : 87 - 93