Verifiable secret sharing and time capsules

被引:0
|
作者
Pieprzyk, J [1 ]
Okamoto, E
机构
[1] Univ Wollongong, Sch IT & Comp Sci, Ctr Comp Secur Res, Wollongong, NSW 2522, Australia
[2] Univ Wisconsin, Ctr Cryptog Comp & Network Secur, Milwaukee, WI 53201 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper considers verifiable Shamir secret sharing and presents three schemes. The first scheme allows to validate secrets recovered. The second construction adds the cheater identification feature also called the share validation capability. The third scheme permits to share multiple secrets with secret validation. The constructions are based on hashing and for security evaluation, hashing is modelled as a random oracle with public description. We discuss an application of verifiable secret sharing for the design of cryptographic time capsules for time-release crypto.
引用
收藏
页码:169 / 183
页数:15
相关论文
共 50 条
  • [21] A quantum secret sharing scheme with verifiable function
    Liu, Li-Juan
    Li, Zhi-Hui
    Han, Zhao-Wei
    Zhi, Dan-Li
    EUROPEAN PHYSICAL JOURNAL D, 2020, 74 (07):
  • [22] Verifiable secret sharing in a total of three rounds
    Agrawal, Shashank
    INFORMATION PROCESSING LETTERS, 2012, 112 (22) : 856 - 859
  • [23] Homomorphisms of secret sharing schemes: A tool for verifiable signature sharing
    Burmester, M
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 96 - 106
  • [24] STRONG VERIFIABLE SECRET SHARING EXTENDED ABSTRACT
    DWORK, C
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 486 : 213 - 227
  • [25] A Secure Verifiable Scheme for Secret Image Sharing
    Rose, Angel A.
    Thampi, Sabu M.
    SECOND INTERNATIONAL SYMPOSIUM ON COMPUTER VISION AND THE INTERNET (VISIONNET'15), 2015, 58 : 140 - 150
  • [26] Sigma Protocols from Verifiable Secret Sharing and Their Applications
    Zhang, Min
    Chen, Yu
    Yao, Chuanzhou
    Wang, Zhichao
    ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT II, 2023, 14439 : 208 - 242
  • [27] Batch-verifiable Secret Sharing with Unconditional Privacy
    Krenn, Stephan
    Unser, Thomas Lor
    Striecks, Christoph
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 303 - 311
  • [28] A Finite Equivalence of Verifiable Multi-secret Sharing
    Zhao, Hui
    Li, Mingchu
    Sakurai, Kouichi
    Ren, Yizhi
    Sun, Jonathan Z.
    Wang, Fengying
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2012, 5 (01) : 1 - 12
  • [29] A Verifiable Secret Sharing Approach for Secure MultiCloud Storage
    Benzekki, Kamal
    El Fergougui, Abdeslam
    Elalaoui, Abdelbaki Elbelrhiti
    UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 : 225 - 234
  • [30] A Finite Equivalence of Verifiable Multi-secret Sharing
    Hui Zhao
    Mingchu Li
    Kouichi Sakurai
    Yizhi Ren
    Jonathan Z. Sun
    Fengying Wang
    International Journal of Computational Intelligence Systems, 2012, 5 : 1 - 12