Book ChapterDOI
An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency
Reads0
Chats0
TLDR
A simple t-out-of-n secret sharing scheme, which can reconstruct the secret in presence of t cheating participants except with probability at most δ, provided t < n/2, is designed.Abstract:
In this paper, we consider the problem of (t, δ) robust secret sharing secure against rushing adversary. We design a simple t-out-of-n secret sharing scheme, which can reconstruct the secret in presence of t cheating participants except with probability at most δ, provided t < n/2. The later condition on cheater resilience is optimal for the case of public reconstruction of the secret, on which we focus in this work.read more
Citations
More filters
Book
Advances in cryptology : Eurocrypt 2011 : 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15-19, 2011 : proceedings
TL;DR: This book constitutes the refereed proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2011, held in Tallinn, Estonia, in May 2011, and contains 31 papers, presented together with 2 invited talks.
Journal ArticleDOI
Cheating identifiable secret sharing scheme using symmetric bivariate polynomial
TL;DR: This paper considers cheating problem in bivariate polynomial based secret sharing scheme, and proposes two cheating identification algorithms respectively that are efficient with respect of cheater identification capabilities and achieves stronger capability of cheating identification with the collaboration of the rest n − m users who are not involved in secret reconstruction.
Book ChapterDOI
Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters
TL;DR: This paper considers two very important issues namely detection and identification of k-out-of-n secret sharing schemes against rushing cheaters who are allowed to submit (possibly forged) shares after observing shares of the honest users in the reconstruction phase.
Book ChapterDOI
Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters
TL;DR: This paper presents definitions of cheating detectable, cheater identifiable and robust secret sharing schemes in compartmental access structure and their realization through five different constructions in the information-theoretic setting and proposes protocols secure against rushing adversary.
Journal ArticleDOI
Ramp secret sharing with cheater identification in presence of rushing cheaters
TL;DR: The security model for cheater identifiable ramp secret sharing schemes is defined and two constructions for cheating cheaters are provided, one of which is secure against rushing cheaters who are allowed to submit their shares during secret reconstruction after observing other participants’ responses in one round.
References
More filters
Journal ArticleDOI
How to share a secret with cheaters
Martin Tompa,Heather Woll +1 more
TL;DR: This paper demonstrates that Shamir's scheme is not secure against certain forms of cheating, and a small modification to his scheme retains the security and efficiency of the original and preserves the property that its security does not depend on any unproven assumptions such as the intractability of computing number-theoretic functions.
Book ChapterDOI
More Efficient Constant-Round Multi-party Computation from BMR and SHE
TL;DR: In this article, the authors present a multi-party computation protocol in the case of dishonest majority which has very low round complexity, which sits philosophically between Gentry's Fully Homomorphic Encryption based protocol and the SPDZ-BMR protocol of Lindell et al.
BookDOI
Advances in Cryptology – ASIACRYPT 2006
Xuejia Lai,Kefei Chen +1 more
TL;DR: A strategy for Finding Roots of Multivariate Polynomials with new applications in Attacking RSA Variants is proposed and a new approach for Selectively Convertible Undeniable Signature Schemes is proposed.
Proceedings Article
Verifiable Secret Sharing and Multiparty Protocols with Honest Majority (Extended Abstract)
Tal Rabin,Michael Ben-Or +1 more
TL;DR: A verifiable secret sharing protocol is presented, and it is shown that any multiparty protocol, or game with incomplete information, can be achieved if a majority of the players are honest.
Book ChapterDOI
Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors
TL;DR: Algebraic manipulation detection (AMD) as discussed by the authors is a new primitive that encodes a source s into a value x stored on a storage device so that any tampering by an adversary will be detected.