Verifiable Secret Share for file storage with cheater identification

被引:1
|
作者
Galletta, Antonino [1 ]
Fazio, Maria [1 ]
Celesti, Antonio [1 ]
Villari, Massimo [1 ]
机构
[1] Univ Messina, MIFT Dept, Messina, Italy
关键词
Secret Share; Verifiable Secret Share; Distributed Storage; Security; RRNS;
D O I
10.1109/CCGrid49817.2020.000-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Verifiable Secret Share (VSS) is a branch of Secret Share (SS) that allowVerifiable Secret Share (VSS) is a branch of Secret Share (SS) that allows verifying the correctness of recomposed files. VSS techniques usually check the correctness of secrets at the end of the re-composition process, therefore, in case of errors, a lot of computational resources and time are wasted. In this paper, we propose an innovative VSS model that is able to verify the correctness of SS fragments before the ending of the recomposition task, thus increasing efficiency and response time. The basic idea behind the proposed approach is to make use of a Hash function to validate fragments, thus to decide if the recomposition task can be performed or not. The experimental result validates our model and proves its applicability in distributed storage systems.
引用
收藏
页码:788 / 793
页数:6
相关论文
共 50 条
  • [1] Verifiable Image Secret Sharing with Cheater Identification
    Patil, Sonali D.
    Ithape, Priya K.
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1238 - 1241
  • [2] A verifiable secret sharing scheme with combiner verification and cheater identification
    Kandar, Shyamalendu
    Dhara, Bibhas Chandra
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 51
  • [3] A verifiable threshold secret image sharing (SIS) scheme with combiner verification and cheater identification
    Soreng A.V.
    Kandar S.
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (08) : 10631 - 10655
  • [4] Cheater identification in secret sharing scheme
    Shi, Ronghua
    Hu, Xiangling
    [J]. Dianzi Keji Daxue Xuebao/Journal of University of Electronic Science and Technology of China, 2000, 29 (01): : 38 - 40
  • [5] Verifiable varying sized (m, n, n) multi-image secret sharing with combiner verification and cheater identification
    Soreng, Aswini Vinay
    Kandar, Shyamalendu
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2022, 84
  • [6] A concept of designing cheater identification methods for secret sharing
    Hwang, RJ
    Lee, WB
    Chang, CC
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 1999, 46 (01) : 7 - 11
  • [7] CHEATING DETECTION AND CHEATER IDENTIFICATION IN SECRET SHARING SCHEMES
    WU, TC
    WU, TS
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1995, 142 (05): : 367 - 369
  • [8] Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols
    Basu, Soumya
    Tomescu, Alin
    Abraham, Ittai
    Malkhi, Dahlia
    Reiter, Michael K.
    Sirer, Emin Gun
    [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 2387 - 2402
  • [9] Ramp secret sharing with cheater identification in presence of rushing cheaters
    Pramanik, Jyotirmoy
    Adhikari, Avishek
    [J]. GROUPS COMPLEXITY CRYPTOLOGY, 2019, 11 (02) : 103 - 113
  • [10] A Verifiable Secret Sharing Approach for Secure MultiCloud Storage
    Benzekki, Kamal
    El Fergougui, Abdeslam
    Elalaoui, Abdelbaki Elbelrhiti
    [J]. UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 : 225 - 234