Verifiable secret sharing and time capsules

被引:0
|
作者
Pieprzyk, J [1 ]
Okamoto, E
机构
[1] Univ Wollongong, Sch IT & Comp Sci, Ctr Comp Secur Res, Wollongong, NSW 2522, Australia
[2] Univ Wisconsin, Ctr Cryptog Comp & Network Secur, Milwaukee, WI 53201 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper considers verifiable Shamir secret sharing and presents three schemes. The first scheme allows to validate secrets recovered. The second construction adds the cheater identification feature also called the share validation capability. The third scheme permits to share multiple secrets with secret validation. The constructions are based on hashing and for security evaluation, hashing is modelled as a random oracle with public description. We discuss an application of verifiable secret sharing for the design of cryptographic time capsules for time-release crypto.
引用
收藏
页码:169 / 183
页数:15
相关论文
共 50 条
  • [1] Publicly verifiable secret sharing
    Stadler, M
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 190 - 199
  • [2] Verifiable Secret Redistribution for Proactive Secret Sharing Schemes
    于佳
    孔凡玉
    李大兴
    JournalofShanghaiJiaotongUniversity(Science), 2006, (02) : 236 - 241
  • [3] Publicly verifiable function secret sharing
    Wang, Qiang
    Zhou, Fucai
    Peng, Su
    Xu, Jian
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2019, 20 (04) : 526 - 535
  • [4] Dynamic and Verifiable Hierarchical Secret Sharing
    Traverso, Giulia
    Demirel, Denise
    Buchmann, Johannes
    INFORMATION THEORETIC SECURITY, ICITS 2016, 2016, 10015 : 24 - 43
  • [5] Computational Verifiable Secret Sharing Revisited
    Backes, Michael
    Kate, Aniket
    Patra, Arpita
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 590 - 609
  • [6] DNA Algorithm of Verifiable Secret Sharing
    Liu Feng
    Gao Dong-Mei
    2009 ETP INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATION (FCC 2009), 2009, : 244 - 246
  • [7] Verifiable Quantum Secret Sharing Protocol Based on Secret Authentication
    Du Yutao
    Bao Wansu
    Li Tan
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (01) : 212 - 217
  • [8] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138
  • [9] Publicly verifiable secret sharing technology in blockchain
    He M.
    Bai F.-H.
    Yu Z.
    Shen T.
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2022, 56 (02): : 306 - 312
  • [10] Publicly verifiable secret sharing with enrollment ability
    Yu, Jia
    Kong, Fanyu
    Hao, Rong
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 194 - +