Secure publicly verifiable and proactive secret sharing schemes with general access structure

被引:28
|
作者
Mashhadi, Samaneh [1 ]
机构
[1] Iran Univ Sci & Technol, Dept Math, Tehran 1684613114, Iran
关键词
Publicly verifiable secret sharing; Proactive scheme; Standard model; Bilinear pairing; Monotone span program; Robust;
D O I
10.1016/j.ins.2016.10.040
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A publicly verifiable secret sharing allows anyone to detect the cheating of dealer or participants only from the public information. In this paper, by using bilinear pairings and monotone span programs we propose two practical publicly verifiable secret sharing schemes with general access structure. The first scheme has provable security in the standard model. The other scheme is proactive, robust and secure against mobile attack. These schemes tolerate active and adaptive adversaries and provide great capabilities for many applications. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:99 / 108
页数:10
相关论文
共 50 条
  • [31] A Secure Verifiable Scheme for Secret Image Sharing
    Rose, Angel A.
    Thampi, Sabu M.
    SECOND INTERNATIONAL SYMPOSIUM ON COMPUTER VISION AND THE INTERNET (VISIONNET'15), 2015, 58 : 140 - 150
  • [32] Proactive Verifiable Linear Integer Secret Sharing Scheme
    Ma, Chuangui
    Ding, Xiaofei
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2009, 5927 : 439 - 448
  • [33] A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction
    Lin, Changlu
    Hu, Huidan
    Chang, Chin-Chen
    Tang, Shaohua
    IEEE ACCESS, 2018, 6 : 70666 - 70673
  • [34] Homomorphisms of secret sharing schemes: A tool for verifiable signature sharing
    Burmester, M
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 96 - 106
  • [35] A PAIRING-BASED PUBLICLY VERIFIABLE SECRET SHARING SCHEME
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2011, 24 (01) : 186 - 194
  • [36] A pairing-based publicly verifiable secret sharing scheme
    Tsu-Yang Wu
    Yuh-Min Tseng
    Journal of Systems Science and Complexity, 2011, 24 : 186 - 194
  • [37] Optimistic fair exchange based on publicly verifiable secret sharing
    Avoine, G
    Vaudenay, S
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 74 - 85
  • [38] Unconditionally-secure ideal robust secret sharing schemes for threshold and multilevel access structure
    Jhanwar, Mahabir P.
    Safavi-Naini, Reihaneh
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2013, 7 (04) : 279 - 296
  • [39] The access structure of some secret-sharing schemes
    Renvall, A
    Ding, CS
    INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 67 - 78
  • [40] A secure and efficient secret sharing scheme with general access structures
    Pang, Liao-Jun
    Li, Hui-Xian
    Wang, Yu-Min
    FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PROCEEDINGS, 2006, 4223 : 646 - 649