A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps

被引:0
|
作者
Ziba Eslami
Saideh Kabiri Rad
机构
[1] Shahid Beheshti University,Department of Computer Science
[2] G.C.,School of Mathematics
[3] Institute for Research in Fundamental Sciences (IPM),undefined
来源
关键词
Threshold scheme; Verifiable scheme; Multi-secret sharing; Bilinear pairing; Multi-use scheme;
D O I
暂无
中图分类号
学科分类号
摘要
In a (t, n)-threshold multi-secret sharing scheme, several secrets are shared among n participants in such a way that any t (or more) of them can reconstruct the secrets while a group of (t − 1) can not obtain any information. Therefore, when such schemes are used to distribute sensitive information over a network, fault tolerance property is achieved since even if n − t of the nodes go out of function, the remaining t nodes suffice to recover the information. In 2009, Wang et al. proposed a verifiable (t, n)-threshold multi-secret sharing scheme (WTS) based on elliptic curves in which the secrets can change periodically [Wireless Pers. Commun., Springer-Verlage, doi:10.1007/s11277-009-9875-0]. In this paper, we propose a verifiable (t, n)-threshold multi-secret sharing scheme based on bilinear maps. Our scheme does not require a secure channel and participants can verify the shares pooled in the reconstruction phase. Our proposed scheme is multi-use such that in order to change the secrets, it is sufficient to renew some public information. Furthermore, the proposed scheme is flexible to the threshold value. Therefore, our proposed scheme has all the merits of (WTS), however, we achieve two major improvements. First when the secrets are to be changed, we require to publish fewer public values. This reduction can be very important in certain applications such as steganographic use of secret sharing schemes. The second is that (WTS) is designed with the assumption that the number of secrets (m) is equal to the threshold t so that the case m > t is handled by repeating the scheme \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\left\lceil \frac{m}{t}\right\rceil}$$\end{document} times. However, in designing the scheme we do not assume any restrictions on the number of secrets.
引用
收藏
页码:459 / 467
页数:8
相关论文
共 50 条
  • [1] A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps
    Eslami, Ziba
    Rad, Saideh Kabiri
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2012, 63 (02) : 459 - 467
  • [2] Dynamic and verifiable multi-secret sharing scheme based on Hermite interpolation and bilinear maps
    Tadayon, Mohammad Hesam
    Khanmohammadi, Hadi
    Haghighi, Mohammad Sayad
    [J]. IET INFORMATION SECURITY, 2015, 9 (04) : 234 - 239
  • [3] Dynamic and verifiable threshold multi-secret sharing scheme based on bilinear pairings
    Li, Huina
    [J]. ICIC Express Letters, 2015, 9 (10): : 2819 - 2825
  • [4] Publicly verifiable multi-secret sharing scheme from bilinear pairings
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    [J]. IET INFORMATION SECURITY, 2013, 7 (03) : 239 - 246
  • [5] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    [J]. INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138
  • [6] A verifiable multi-secret sharing scheme (VMSS)
    Pang Liaojun
    Li Huixian
    Jiao Licheng
    Wang Yumin
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 749 - +
  • [7] Verifiable Rational Multi-secret Sharing Scheme
    Cai, Yongquan
    Luo, Zhanhai
    Yang, Yi
    [J]. INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 : 42 - 48
  • [8] On Novel Verifiable Multi-Secret Sharing Scheme
    Wang, Jian
    Liu, Yanheng
    Wang, Yanxi
    [J]. ADVANCED SCIENCE LETTERS, 2011, 4 (11-12) : 3709 - 3715
  • [9] A practical verifiable multi-secret sharing scheme
    Zhao, Jianjie
    Zhang, Jianzhong
    Zhao, Rong
    [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) : 138 - 141
  • [10] A verifiable multi-secret sharing scheme based on cellular automata
    Eslami, Z.
    Ahmadabadi, J. Zarepour
    [J]. INFORMATION SCIENCES, 2010, 180 (15) : 2889 - 2894