scispace - formally typeset
Book ChapterDOI

A Fair (t, n)-Threshold Secret Sharing Scheme with Efficient Cheater Identifying

TLDR
This paper proposes a fair (t, n)-threshold secret sharing scheme with an efficient cheater identifying ability and proves that the cheater identification algorithm has higher efficiency by comparing with other schemes.
Abstract
The fairness of secret sharing guarantees that, if either participant obtains the secret, other participants obtain too. The fairness can be threatened by cheaters who was hidden in the participants. To efficiently and accurately identify cheaters with guaranteeing fairness, this paper proposes a fair (t, n)-threshold secret sharing scheme with an efficient cheater identifying ability. The scheme consists of three protocols which correspond to the secret distribution phase, secret reconstruction phase, and cheater identification phase respectively. The scheme’s secret distribution strategy enables the secret reconstruction protocol to detect the occurrence of cheating and trigger the execution of the cheater identification protocol to accurately locate cheaters. Moreover, we prove that the scheme is fair and secure, and show that the cheater identification algorithm has higher efficiency by comparing with other schemes.

read more

Citations
More filters
Journal ArticleDOI

A Privacy-Preserving and Verifiable Statistical Analysis Scheme for an E-Commerce Platform

TL;DR: Wang et al. as discussed by the authors proposed a privacy-preserving and verifiable statistical analysis scheme for an e-commerce platform that combines a threshold secret sharing scheme with a verifiable threshold homomorphic encryption scheme.
References
More filters
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Journal ArticleDOI

How to share a secret with cheaters

TL;DR: This paper demonstrates that Shamir's scheme is not secure against certain forms of cheating, and a small modification to his scheme retains the security and efficiency of the original and preserves the property that its security does not depend on any unproven assumptions such as the intractability of computing number-theoretic functions.
Journal ArticleDOI

Detection and identification of cheaters in (t, n) secret sharing scheme

TL;DR: This paper considers the situation that there are more than t shareholders participated in the secret reconstruction and uses the shares generated by the dealer to reconstruct the secret and, at the same time, to detect and identify cheaters.
Journal ArticleDOI

Distributed Secret Sharing Approach With Cheater Prevention Based on QR Code

TL;DR: This article designs a secret QR sharing approach to protect the private QR data with a secure and reliable distributed system and provides content readability, cheater detectability, and an adjustable secret payload of the QR barcode.
Journal ArticleDOI

Cheating identifiable secret sharing scheme using symmetric bivariate polynomial

TL;DR: This paper considers cheating problem in bivariate polynomial based secret sharing scheme, and proposes two cheating identification algorithms respectively that are efficient with respect of cheater identification capabilities and achieves stronger capability of cheating identification with the collaboration of the rest n − m users who are not involved in secret reconstruction.
Related Papers (5)