scispace - formally typeset
Book ChapterDOI

On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary

Reads0
Chats0
TLDR
This paper presents a new scheme, which is secure against rushing adversary, with |V i | = |S|/e n − t + 1, assuming t < k/3, and demonstrates an improvement in share size achieved for the price of strengthening the assumption on t.
Abstract
At EUROCRYPT 2011, Obana proposed a k-out-of-n secret sharing scheme capable of identifying up to t cheaters with probability 1 − e under the condition t < k/3 In that scheme, the share size |V i | satisfies |V i | = |S|/e, which is almost optimal However, Obana’s scheme is known to be vulnerable to attacks by rushing adversary who can observe the messages sent by the honest participants prior to deciding her own messages In this paper, we present a new scheme, which is secure against rushing adversary, with |V i | = |S|/e n − t + 1, assuming t < k/3 We note that the share size of our proposal is substantially smaller compared to |V i | = |S|(t + 1)3n /e 3n in the scheme by Choudhury at PODC 2012 when the secret is a single field element A modification of the later scheme is secure against rushing adversary under a weaker t < k/2 condition Therefore, our scheme demonstrates an improvement in share size achieved for the price of strengthening the assumption on t

read more

Citations
More filters
Book

Advances in cryptology : Eurocrypt 2011 : 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15-19, 2011 : proceedings

TL;DR: This book constitutes the refereed proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2011, held in Tallinn, Estonia, in May 2011, and contains 31 papers, presented together with 2 invited talks.
Journal ArticleDOI

E-voting scheme using secret sharing and K-anonymity

TL;DR: A novel e-voting scheme is proposed using secret sharing and k-anonymity that not only satisfies the basic security goals such as the non-cheating, the universal verifiability, the confidentiality, and the anonymity, but also achieves the addition properties including coercion-resistance and unconditional security.
Book ChapterDOI

E-Voting Scheme Using Secret Sharing and K-Anonymity

TL;DR: An e-v voting scheme is proposed, in which the voter’s ballot is shared among all the candidates in voting phase, and voting system publishes the ballot on the bulletin board in the post-voting phase.
Book ChapterDOI

Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication

TL;DR: Two publicly cheater identifiable secret sharing schemes with efficient reconstruction are introduced, tolerating t < k/2 cheaters, and they feature a novel application of multi-receiver authentication codes to ensure integrity of shares.
Book ChapterDOI

Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field

TL;DR: A k-out-of-n threshold secret sharing scheme which can detect share forgery by at most k − 1 cheaters and possess such a merit that a secret can be an element of arbitrary finite field is presented.
References
More filters
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Proceedings ArticleDOI

Safeguarding cryptographic keys

TL;DR: Certain cryptographic keys, such as a number which makes it possible to compute the secret decoding exponent in an RSA public key cryptosystem, 1 , 5 or the system master key and certain other keys in a DES cryptos system, 3 are so important that they present a dilemma.
Journal ArticleDOI

Polynomial Codes Over Certain Finite Fields

TL;DR: A mapping of m symbols into 2 symbols will be shown to be (2 m)/2 or ( 2 m 1)/2 symbol correcting, depending on whether m is even or odd.
Journal ArticleDOI

New hash functions and their use in authentication and set equality

TL;DR: Several new classes of hash functions with certain desirable properties are exhibited, and two novel applications for hashing which make use of these functions are introduced, including a provably secure authentication technique for sending messages over insecure lines and the application of testing sets for equality.