A Distributed Multi-secret Sharing Scheme on the (t,n) Threshold

被引:0
|
作者
Chen, Guiqiang [1 ]
Wang, Huanwen [2 ]
Wang, Liqin [3 ]
Jin, Yue [3 ]
机构
[1] Hebei North Univ, Inst Informat Sci & Engn, Zhangjiakou, Peoples R China
[2] Zhangjiakou Vocat Coll Technol, Informat Engn, Zhangjiakou, Peoples R China
[3] Zhangjiakou Vocat Coll Technol, Dept Elect Engn, Zhangjiakou, Peoples R China
关键词
Multi-secret sharing; discrete logarithm; dynamic threshold; Lagrange interpolation formula;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the most present threshold multi-secret sharing scheme, there were some problems. For example, each participant's shadow was generated by the dealer, the fixed threshold, need of the secure channels, the fixed dealer or the secret center. To overcome these problems, a distributed multi-secret sharing scheme on the (t, n) threshold was proposed in this paper. This scheme has the following properties: 1) Each participant selects his shadow by himself; 2) There is no secure channel 3) There is no the fixed dealer, each participant may be dealer to distribute the multi-secret, and the multi-secret could be accomplished one time such as to distribute and to comeback and to update and to validate and so on operations;4) The participant could be dynamically added or deleted; 5) The efficient solutions against multiform cheating of any participant are proposed, therefore the proposed scheme has practicability and highly security.
引用
收藏
页码:358 / +
页数:2
相关论文
共 50 条
  • [31] Dynamic(m+n, t+t2)threshold multi-secret sharing scheme without trusted center
    Beijing Electronic Science and Technology Institute, Beijing 100070, China
    不详
    Tongxin Xuebao, 2007, SUPPL. (172-176):
  • [32] A Verifiable (k,n,m)-Threshold Multi-secret Sharing Scheme Based on NTRU Cryptosystem
    Ali Nakhaei Amroudi
    Ali Zaghain
    Mahdi Sajadieh
    Wireless Personal Communications, 2017, 96 : 1393 - 1405
  • [33] A non-interactive (t, n)-publicly verifiable multi-secret sharing scheme
    Mashahdi, Samaneh
    Bagherpour, Bagher
    Zaghian, Ali
    DESIGNS CODES AND CRYPTOGRAPHY, 2022, 90 (08) : 1761 - 1782
  • [34] GOMSS: A Simple Group Oriented(t, m, n) Multi-secret Sharing Scheme
    MIAO Fuyou
    WANG Li
    JI Yangyang
    XIONG Yan
    Chinese Journal of Electronics, 2017, 26 (03) : 557 - 563
  • [35] A (k,t,n) verifiable multi-secret sharing scheme based on adversary structure
    Li, Jing
    Wang, Licheng
    Yan, Jianhua
    Niu, Xinxin
    Yang, Yixian
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (12): : 4552 - 4567
  • [36] Multi-Secret Sharing Threshold Access Structure
    Reddy, L. Siva
    Prasad, Munaga V. N. K.
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 1585 - 1590
  • [37] GOMSS: A Simple Group Oriented (t, m, n) Multi-secret Sharing Scheme
    Miao Fuyou
    Wang Li
    Ji Yangyang
    Xiong Yan
    CHINESE JOURNAL OF ELECTRONICS, 2017, 26 (03) : 557 - 563
  • [38] An efficient threshold verifiable multi-secret sharing
    Dehkordi, Massoud Hadian
    Mashhadi, Samaneh
    COMPUTER STANDARDS & INTERFACES, 2008, 30 (03) : 187 - 190
  • [39] Verifiable Threshold Scheme in Multi-Secret Sharing Distributions upon Extensions of ECC
    Shiuh-Jeng Wang
    Yuh-Ren Tsai
    Chien-Chih Shen
    Wireless Personal Communications, 2011, 56 : 173 - 182
  • [40] (t, n) multi-secret sharing scheme extended from Harn-Hsu's scheme
    Zhang, Tong
    Ke, Xizheng
    Liu, Yanxiao
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,