ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism

被引:0
|
作者
Ruonan Shi
Yuling Chen
Chaoyue Tan
Yun Luo
Tao Li
机构
[1] Guizhou University,State Key Laboratory of Public Big Data, College of Computer Science and Technology
来源
关键词
Multi-secret sharing; Cloud computing; Rationality; Reputation mechanism;
D O I
暂无
中图分类号
学科分类号
摘要
The traditional threshold secret sharing scheme only allows the participants’ sub-secret shares to be used once in the reconstruction process. Several multi-secret sharing schemes have been proposed that are related to cloud computing, aiming to improve reconstruction efficiency. Rational secret sharing is a technique that combines secret sharing with game theory. In traditional rational multi-secret sharing, participants must reconstruct all secrets, resulting in unnecessary overhead. Rational participants will act dishonestly to maximize their own interests, leading to a prisoner’s dilemma and incomplete secret reconstruction. Additionally, when sharing multiple secrets, the Dealer must distribute the sub-secret shares of all secrets to the participants, increasing overhead. In this paper, we propose a rational optional multi-secret sharing scheme based on a reputation mechanism that selectively reconstructs secrets according to participants’ needs in the context of cloud computing. Our scheme introduces a reputation mechanism to evaluate participants’ reputation values to avoid their dishonest behaviors. Furthermore, we adopt a broadcast encryption matrix so that participants only need to receive a single sub-secret share to participate in multi-secret reconstruction. Our security analysis shows that the proposed scheme can effectively constrain the self-interested behavior of rational participants and reduce the overhead in the process, thus multi-secret sharing scheme can provide more efficient and secure solutions for secret sharing in key management and distributive storage for the cloud scenarios.
引用
收藏
相关论文
共 50 条
  • [41] A Verifiable Multi-Secret Sharing Scheme Based on Short Integer Solution
    LI Fulin
    YAN Jiayun
    ZHU Shixin
    HU Hang
    [J]. Chinese Journal of Electronics, 2023, 32 (03) : 556 - 563
  • [42] A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps
    Ziba Eslami
    Saideh Kabiri Rad
    [J]. Wireless Personal Communications, 2012, 63 : 459 - 467
  • [43] A new multi-secret sharing scheme with multi-policy
    Geng Yong-Jun
    Fan Xiao-Hong
    Hong Fan
    [J]. 9th International Conference on Advanced Communication Technology: Toward Network Innovation Beyond Evolution, Vols 1-3, 2007, : 1515 - 1517
  • [44] A practical (t, n) multi-secret sharing scheme
    Chien, HY
    Jan, JK
    Tseng, YM
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2000, E83A (12) : 2762 - 2765
  • [45] A hierarchical weighted threshold multi-secret sharing scheme
    Chang, CC
    Pan, YP
    [J]. Proceedings of the Second International Conference on Information and Management Sciences, 2002, 2 : 333 - 340
  • [46] A new double layer multi-secret sharing scheme
    Gunasekaran, Elavarasi
    Muthuraman, Vanitha
    [J]. CHINA COMMUNICATIONS, 2024, 21 (01) : 287 - 309
  • [47] Design and Analysis of a New Multi-secret Sharing Scheme
    Liu Feng
    Gao Dong-Mei
    [J]. 2009 ETP INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATION (FCC 2009), 2009, : 241 - 243
  • [48] Multi-secret sharing scheme with general access structures
    Li, Hui-Xian
    Cheng, Chun-Tian
    Pang, Liao-Jun
    [J]. Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2006, 34 (06): : 95 - 98
  • [49] A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction
    Lin, Changlu
    Hu, Huidan
    Chang, Chin-Chen
    Tang, Shaohua
    [J]. IEEE ACCESS, 2018, 6 : 70666 - 70673
  • [50] A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem
    Chen, Zhenhua
    Li, Shundong
    Zhu, Youwen
    Yan, Jianhua
    Xu, Xinli
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3592 - 3601