A Distributed Multi-secret Sharing Scheme on the (t,n) Threshold

被引:0
|
作者
Chen, Guiqiang [1 ]
Wang, Huanwen [2 ]
Wang, Liqin [3 ]
Jin, Yue [3 ]
机构
[1] Hebei North Univ, Inst Informat Sci & Engn, Zhangjiakou, Peoples R China
[2] Zhangjiakou Vocat Coll Technol, Informat Engn, Zhangjiakou, Peoples R China
[3] Zhangjiakou Vocat Coll Technol, Dept Elect Engn, Zhangjiakou, Peoples R China
关键词
Multi-secret sharing; discrete logarithm; dynamic threshold; Lagrange interpolation formula;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the most present threshold multi-secret sharing scheme, there were some problems. For example, each participant's shadow was generated by the dealer, the fixed threshold, need of the secure channels, the fixed dealer or the secret center. To overcome these problems, a distributed multi-secret sharing scheme on the (t, n) threshold was proposed in this paper. This scheme has the following properties: 1) Each participant selects his shadow by himself; 2) There is no secure channel 3) There is no the fixed dealer, each participant may be dealer to distribute the multi-secret, and the multi-secret could be accomplished one time such as to distribute and to comeback and to update and to validate and so on operations;4) The participant could be dynamically added or deleted; 5) The efficient solutions against multiform cheating of any participant are proposed, therefore the proposed scheme has practicability and highly security.
引用
收藏
页码:358 / +
页数:2
相关论文
共 50 条
  • [41] Dynamic and verifiable threshold multi-secret sharing scheme based on bilinear pairings
    Li, Huina
    ICIC Express Letters, 2015, 9 (10): : 2819 - 2825
  • [42] A verifiable multi-secret sharing scheme (VMSS)
    Pang Liaojun
    Li Huixian
    Jiao Licheng
    Wang Yumin
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 749 - +
  • [43] (t,n) multi-secret sharing scheme extended from Harn-Hsu’s scheme
    Tong Zhang
    Xizheng Ke
    Yanxiao Liu
    EURASIP Journal on Wireless Communications and Networking, 2018
  • [44] Verifiable Rational Multi-secret Sharing Scheme
    Cai, Yongquan
    Luo, Zhanhai
    Yang, Yi
    INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 : 42 - 48
  • [45] Verifiable Threshold Scheme in Multi-Secret Sharing Distributions upon Extensions of ECC
    Wang, Shiuh-Jeng
    Tsai, Yuh-Ren
    Shen, Chien-Chih
    WIRELESS PERSONAL COMMUNICATIONS, 2011, 56 (01) : 173 - 182
  • [46] Threshold multi-secret sharing scheme based on phase-shifting interferometry
    Deng, Xiaopeng
    Wen, Wei
    Shi, Zhengang
    OPTICS COMMUNICATIONS, 2017, 387 : 409 - 414
  • [47] On Novel Verifiable Multi-Secret Sharing Scheme
    Wang, Jian
    Liu, Yanheng
    Wang, Yanxi
    ADVANCED SCIENCE LETTERS, 2011, 4 (11-12) : 3709 - 3715
  • [48] A practical verifiable multi-secret sharing scheme
    Zhao, Jianjie
    Zhang, Jianzhong
    Zhao, Rong
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) : 138 - 141
  • [49] Decentralized CRT-Based Efficient Verifiable (n, t, n) Multi-secret Sharing Scheme
    Wen, Wen
    Vaidya, Binod
    Makrakis, Dimitrios
    Adams, Carlisle
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 279 - 293
  • [50] A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme
    Shao, J
    Cao, ZF
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) : 135 - 140