A Distributed Multi-secret Sharing Scheme on the (t,n) Threshold

被引:0
|
作者
Chen, Guiqiang [1 ]
Wang, Huanwen [2 ]
Wang, Liqin [3 ]
Jin, Yue [3 ]
机构
[1] Hebei North Univ, Inst Informat Sci & Engn, Zhangjiakou, Peoples R China
[2] Zhangjiakou Vocat Coll Technol, Informat Engn, Zhangjiakou, Peoples R China
[3] Zhangjiakou Vocat Coll Technol, Dept Elect Engn, Zhangjiakou, Peoples R China
关键词
Multi-secret sharing; discrete logarithm; dynamic threshold; Lagrange interpolation formula;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the most present threshold multi-secret sharing scheme, there were some problems. For example, each participant's shadow was generated by the dealer, the fixed threshold, need of the secure channels, the fixed dealer or the secret center. To overcome these problems, a distributed multi-secret sharing scheme on the (t, n) threshold was proposed in this paper. This scheme has the following properties: 1) Each participant selects his shadow by himself; 2) There is no secure channel 3) There is no the fixed dealer, each participant may be dealer to distribute the multi-secret, and the multi-secret could be accomplished one time such as to distribute and to comeback and to update and to validate and so on operations;4) The participant could be dynamically added or deleted; 5) The efficient solutions against multiform cheating of any participant are proposed, therefore the proposed scheme has practicability and highly security.
引用
收藏
页码:358 / +
页数:2
相关论文
共 50 条
  • [21] (t, n) Multi-Secret Sharing Scheme Based on Bivariate Polynomial
    Harn, Lein
    Hsu, Ching-Fang
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (02) : 1495 - 1504
  • [22] (t, n) Multi-Secret Sharing Scheme Based on Bivariate Polynomial
    Lein Harn
    Ching-Fang Hsu
    Wireless Personal Communications, 2017, 95 : 1495 - 1504
  • [23] Identity (ID)-based threshold multi-secret sharing scheme
    Pang, Liao-Jun
    Pei, Qing-Qi
    Jiao, Li-Cheng
    Wang, Yu-Min
    Ruan Jian Xue Bao/Journal of Software, 2008, 19 (10): : 2739 - 2745
  • [24] A new (t, n) multi-secret sharing scheme based on linear algebra
    Hassani, Seyed Hamed
    Aref, Mohammad Reza
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 443 - +
  • [25] Multi-secret Threshold Sharing Scheme Based on Chinese Remainder Theorem
    Song, Yinong
    Li, Zichen
    2024 4TH INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING, ICICSE 2024, 2024, : 131 - 135
  • [26] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138
  • [27] An Efficient Verifiable Threshold Multi-Secret Sharing Scheme With Different Stages
    Chen, Dong
    Lu, Wei
    Xing, Weiwei
    Wang, Na
    IEEE ACCESS, 2019, 7 : 107104 - 107110
  • [28] A Multi-level threshold multi-Secret Sharing Scheme with Periodic Renewing
    Zou, Hui
    Wang, Jiandong
    Lu, Fengjia
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL III, 2009, : 371 - 373
  • [29] A Verifiable (k,n,m)-Threshold Multi-secret Sharing Scheme Based on NTRU Cryptosystem
    Amroudi, Ali Nakhaei
    Zaghain, Ali
    Sajadieh, Mahdi
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) : 1393 - 1405
  • [30] A non-interactive (t, n)-publicly verifiable multi-secret sharing scheme
    Samaneh Mashahdi
    Bagher Bagherpour
    Ali Zaghian
    Designs, Codes and Cryptography, 2022, 90 : 1761 - 1782