Book ChapterDOI
A Fair (t, n)-Threshold Secret Sharing Scheme with Efficient Cheater Identifying
Shen Hua,Sun Daijie,Zhao Lan,Zhang Mingwu +3 more
- pp 122-132
TLDR
This paper proposes a fair (t, n)-threshold secret sharing scheme with an efficient cheater identifying ability and proves that the cheater identification algorithm has higher efficiency by comparing with other schemes.Abstract:
The fairness of secret sharing guarantees that, if either participant obtains the secret, other participants obtain too. The fairness can be threatened by cheaters who was hidden in the participants. To efficiently and accurately identify cheaters with guaranteeing fairness, this paper proposes a fair (t, n)-threshold secret sharing scheme with an efficient cheater identifying ability. The scheme consists of three protocols which correspond to the secret distribution phase, secret reconstruction phase, and cheater identification phase respectively. The scheme’s secret distribution strategy enables the secret reconstruction protocol to detect the occurrence of cheating and trigger the execution of the cheater identification protocol to accurately locate cheaters. Moreover, we prove that the scheme is fair and secure, and show that the cheater identification algorithm has higher efficiency by comparing with other schemes.read more
Citations
More filters
Journal ArticleDOI
A Privacy-Preserving and Verifiable Statistical Analysis Scheme for an E-Commerce Platform
TL;DR: Wang et al. as discussed by the authors proposed a privacy-preserving and verifiable statistical analysis scheme for an e-commerce platform that combines a threshold secret sharing scheme with a verifiable threshold homomorphic encryption scheme.
References
More filters
Journal ArticleDOI
How to share a secret
TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Journal ArticleDOI
How to share a secret with cheaters
Martin Tompa,Heather Woll +1 more
TL;DR: This paper demonstrates that Shamir's scheme is not secure against certain forms of cheating, and a small modification to his scheme retains the security and efficiency of the original and preserves the property that its security does not depend on any unproven assumptions such as the intractability of computing number-theoretic functions.
Journal ArticleDOI
Detection and identification of cheaters in (t, n) secret sharing scheme
Lein Harn,Changlu Lin +1 more
TL;DR: This paper considers the situation that there are more than t shareholders participated in the secret reconstruction and uses the shares generated by the dealer to reconstruct the secret and, at the same time, to detect and identify cheaters.
Journal ArticleDOI
Distributed Secret Sharing Approach With Cheater Prevention Based on QR Code
TL;DR: This article designs a secret QR sharing approach to protect the private QR data with a secure and reliable distributed system and provides content readability, cheater detectability, and an adjustable secret payload of the QR barcode.
Journal ArticleDOI
Cheating identifiable secret sharing scheme using symmetric bivariate polynomial
TL;DR: This paper considers cheating problem in bivariate polynomial based secret sharing scheme, and proposes two cheating identification algorithms respectively that are efficient with respect of cheater identification capabilities and achieves stronger capability of cheating identification with the collaboration of the rest n − m users who are not involved in secret reconstruction.
Related Papers (5)
Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters Based on Message Authentication
Masahito Hayashi,Takeshi Koshiba +1 more
An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency
Cheating detection and cheater identification in secret sharing schemes
Tzong-Chen Wu,T.-S. Wu +1 more