Secure publicly verifiable and proactive secret sharing schemes with general access structure

被引:28
|
作者
Mashhadi, Samaneh [1 ]
机构
[1] Iran Univ Sci & Technol, Dept Math, Tehran 1684613114, Iran
关键词
Publicly verifiable secret sharing; Proactive scheme; Standard model; Bilinear pairing; Monotone span program; Robust;
D O I
10.1016/j.ins.2016.10.040
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A publicly verifiable secret sharing allows anyone to detect the cheating of dealer or participants only from the public information. In this paper, by using bilinear pairings and monotone span programs we propose two practical publicly verifiable secret sharing schemes with general access structure. The first scheme has provable security in the standard model. The other scheme is proactive, robust and secure against mobile attack. These schemes tolerate active and adaptive adversaries and provide great capabilities for many applications. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:99 / 108
页数:10
相关论文
共 50 条
  • [41] Computationally Secure Cheating Identifiable Multi-Secret Sharing for General Access Structure
    Roy, Partha Sarathi
    Das, Angsuman
    Adhikari, Avishek
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2015, 2015, 8956 : 278 - 287
  • [42] An Efficient and Secure Multi-Secret Image Sharing Scheme with General Access Structure
    Lee, Ching-Fan
    Juan, Justie Su-Tzu
    2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, : 253 - 259
  • [43] Optimal multiple assignment scheme for strongly secure ramp secret sharing schemes with general access structures
    Matsumoto, Ryutaroh
    IEICE COMMUNICATIONS EXPRESS, 2015, 4 (11): : 317 - 320
  • [44] Realizing secret sharing with general access structure
    Harn, Lein
    Hsu, Chingfang
    Zhang, Mingwu
    He, Tingting
    Zhang, Maoyuan
    INFORMATION SCIENCES, 2016, 367 : 209 - 220
  • [45] A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure
    Alam, Irfan
    Alali, Amal S.
    Ali, Shakir
    Asri, Muhammad S. M.
    AXIOMS, 2024, 13 (08)
  • [46] Secret-Sharing Schemes for General and Uniform Access Structures
    Applebaum, Benny
    Beimel, Amos
    Farras, Oriol
    Nir, Oded
    Peter, Naty
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT III, 2019, 11478 : 441 - 471
  • [47] Efficient secret sharing schemes realizing general access structures
    Tochikubo, K
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (07) : 1788 - 1797
  • [48] A Label Graph Based Verifiable Secret Sharing Scheme for General Access Structures
    Hsu, Ching-Fang
    Zeng, Bing
    Cheng, Qi
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2013, 15 (04) : 407 - 410
  • [49] A Verifiable Secret Sharing Approach for Secure MultiCloud Storage
    Benzekki, Kamal
    El Fergougui, Abdeslam
    Elalaoui, Abdelbaki Elbelrhiti
    UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 : 225 - 234
  • [50] A Survey on Perfectly Secure Verifiable Secret-sharing
    Chandramouli, Anirudh
    Choudhury, Ashish
    Patra, Arpita
    ACM COMPUTING SURVEYS, 2022, 54 (11S)