Secure publicly verifiable and proactive secret sharing schemes with general access structure

被引:28
|
作者
Mashhadi, Samaneh [1 ]
机构
[1] Iran Univ Sci & Technol, Dept Math, Tehran 1684613114, Iran
关键词
Publicly verifiable secret sharing; Proactive scheme; Standard model; Bilinear pairing; Monotone span program; Robust;
D O I
10.1016/j.ins.2016.10.040
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A publicly verifiable secret sharing allows anyone to detect the cheating of dealer or participants only from the public information. In this paper, by using bilinear pairings and monotone span programs we propose two practical publicly verifiable secret sharing schemes with general access structure. The first scheme has provable security in the standard model. The other scheme is proactive, robust and secure against mobile attack. These schemes tolerate active and adaptive adversaries and provide great capabilities for many applications. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:99 / 108
页数:10
相关论文
共 50 条
  • [21] Unconditionally Secure Proactive Verifiable Secret Sharing Using New Detection and Recovery Techniques
    Nojoumian, Mehrdad
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [22] Publicly Verifiable Homomorphic Secret Sharing for Polynomial Evaluation
    Chen, Xin
    Zhang, Liang Feng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4609 - 4624
  • [23] Accountable Privacy Based on Publicly Verifiable Secret Sharing
    Kim, Young-Sam
    Kim, Seung-Hyun
    Jin, Seung-Hun
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 1583 - 1586
  • [24] Secret sharing schemes with bipartite access structure
    Padrö, Carles
    Sâez, German
    2000, IEEE, Piscataway, NJ, United States (46)
  • [25] Secret sharing schemes with bipartite access structure
    Padró, C
    Sáez, G
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 500 - 511
  • [26] Secret sharing schemes with bipartite access structure
    Padró, C
    Sáez, G
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (07) : 2596 - 2604
  • [27] A Publicly Verifiable Dynamic Secret Sharing Protocol for Secure and Dependable Data Storage in Cloud Computing
    Kumar, P. Syam
    Ashok, Marie Stanislas
    Subramanian, R.
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2012, 2 (03) : 1 - 25
  • [28] Dynamic access policies for unconditionally secure secret sharing schemes
    Martin, KM
    2005 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005, : 61 - 66
  • [29] Computationally Secure Robust Multi-secret Sharing for General Access Structure
    Das, Angsuman
    Roy, Partha Sarathi
    Adhikari, Avishek
    MATHEMATICS AND COMPUTING, 2015, 139 : 123 - 134
  • [30] Verifiable multi-secret sharing schemes for multiple threshold access structures
    Tartary, Christophe
    Pieprzyk, Josef
    Wang, Huaxiong
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 167 - +