scispace - formally typeset
Book ChapterDOI

An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency

Reads0
Chats0
TLDR
A simple t-out-of-n secret sharing scheme, which can reconstruct the secret in presence of t cheating participants except with probability at most δ, provided t < n/2, is designed.
Abstract
In this paper, we consider the problem of (t, δ) robust secret sharing secure against rushing adversary. We design a simple t-out-of-n secret sharing scheme, which can reconstruct the secret in presence of t cheating participants except with probability at most δ, provided t < n/2. The later condition on cheater resilience is optimal for the case of public reconstruction of the secret, on which we focus in this work.

read more

Citations
More filters
Book

Advances in cryptology : Eurocrypt 2011 : 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15-19, 2011 : proceedings

TL;DR: This book constitutes the refereed proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2011, held in Tallinn, Estonia, in May 2011, and contains 31 papers, presented together with 2 invited talks.
Journal ArticleDOI

Cheating identifiable secret sharing scheme using symmetric bivariate polynomial

TL;DR: This paper considers cheating problem in bivariate polynomial based secret sharing scheme, and proposes two cheating identification algorithms respectively that are efficient with respect of cheater identification capabilities and achieves stronger capability of cheating identification with the collaboration of the rest n − m users who are not involved in secret reconstruction.
Book ChapterDOI

Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters

TL;DR: This paper considers two very important issues namely detection and identification of k-out-of-n secret sharing schemes against rushing cheaters who are allowed to submit (possibly forged) shares after observing shares of the honest users in the reconstruction phase.
Book ChapterDOI

Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters

TL;DR: This paper presents definitions of cheating detectable, cheater identifiable and robust secret sharing schemes in compartmental access structure and their realization through five different constructions in the information-theoretic setting and proposes protocols secure against rushing adversary.
Journal ArticleDOI

Ramp secret sharing with cheater identification in presence of rushing cheaters

TL;DR: The security model for cheater identifiable ramp secret sharing schemes is defined and two constructions for cheating cheaters are provided, one of which is secure against rushing cheaters who are allowed to submit their shares during secret reconstruction after observing other participants’ responses in one round.
References
More filters
Journal ArticleDOI

How to share a secret with cheaters

TL;DR: This paper demonstrates that Shamir's scheme is not secure against certain forms of cheating, and a small modification to his scheme retains the security and efficiency of the original and preserves the property that its security does not depend on any unproven assumptions such as the intractability of computing number-theoretic functions.
Book ChapterDOI

More Efficient Constant-Round Multi-party Computation from BMR and SHE

TL;DR: In this article, the authors present a multi-party computation protocol in the case of dishonest majority which has very low round complexity, which sits philosophically between Gentry's Fully Homomorphic Encryption based protocol and the SPDZ-BMR protocol of Lindell et al.
BookDOI

Advances in Cryptology – ASIACRYPT 2006

Xuejia Lai, +1 more
TL;DR: A strategy for Finding Roots of Multivariate Polynomials with new applications in Attacking RSA Variants is proposed and a new approach for Selectively Convertible Undeniable Signature Schemes is proposed.
Proceedings Article

Verifiable Secret Sharing and Multiparty Protocols with Honest Majority (Extended Abstract)

Tal Rabin, +1 more
TL;DR: A verifiable secret sharing protocol is presented, and it is shown that any multiparty protocol, or game with incomplete information, can be achieved if a majority of the players are honest.
Book ChapterDOI

Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors

TL;DR: Algebraic manipulation detection (AMD) as discussed by the authors is a new primitive that encodes a source s into a value x stored on a storage device so that any tampering by an adversary will be detected.
Related Papers (5)