Verifiable secret sharing and time capsules

被引:0
|
作者
Pieprzyk, J [1 ]
Okamoto, E
机构
[1] Univ Wollongong, Sch IT & Comp Sci, Ctr Comp Secur Res, Wollongong, NSW 2522, Australia
[2] Univ Wisconsin, Ctr Cryptog Comp & Network Secur, Milwaukee, WI 53201 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper considers verifiable Shamir secret sharing and presents three schemes. The first scheme allows to validate secrets recovered. The second construction adds the cheater identification feature also called the share validation capability. The third scheme permits to share multiple secrets with secret validation. The constructions are based on hashing and for security evaluation, hashing is modelled as a random oracle with public description. We discuss an application of verifiable secret sharing for the design of cryptographic time capsules for time-release crypto.
引用
收藏
页码:169 / 183
页数:15
相关论文
共 50 条
  • [31] Verifiable threshold quantum secret sharing with sequential communication
    Lu, Changbin
    Miao, Fuyou
    Hou, Junpeng
    Meng, Keju
    QUANTUM INFORMATION PROCESSING, 2018, 17 (11)
  • [32] Linear threshold verifiable secret sharing in bilinear groups
    Zhang, Jie
    Zhang, Futai
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 212 - 218
  • [33] Verifiable Rational Multi-secret Sharing Scheme
    Cai, Yongquan
    Luo, Zhanhai
    Yang, Yi
    INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 : 42 - 48
  • [34] A Multi-level Verifiable Secret Sharing Algorithm
    Xu, Xiaojie
    Wang, Lisheng
    2016 3RD INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2016, : 507 - 512
  • [35] Verifiable Homomorphic Secret Sharing for Machine Learning Classifiers
    Chen, Xin
    IEEE ACCESS, 2023, 11 : 43639 - 43647
  • [36] Verifiable Homomorphic Secret Sharing for Low Degree Polynomials
    Chen, Xin
    Zhang, Liang Feng
    Liu, Jing
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) : 2882 - 2895
  • [37] A Survey on Perfectly Secure Verifiable Secret-sharing
    Chandramouli, Anirudh
    Choudhury, Ashish
    Patra, Arpita
    ACM COMPUTING SURVEYS, 2022, 54 (11S)
  • [38] Cloud Key Management Based on Verifiable Secret Sharing
    Hedabou, Mustapha
    NETWORK AND SYSTEM SECURITY, NSS 2021, 2021, 13041 : 289 - 303
  • [39] Verifiable quantum (k, n)-threshold secret sharing
    Yang, Yu-Guang
    Jia, Xin
    Wang, Hong-Yang
    Zhang, Hua
    QUANTUM INFORMATION PROCESSING, 2012, 11 (06) : 1619 - 1625
  • [40] Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation
    Patra, Arpita
    Choudhury, Ashish
    Rangan, C. Pandu
    JOURNAL OF CRYPTOLOGY, 2015, 28 (01) : 49 - 109