Verifiable secret sharing and time capsules

被引:0
|
作者
Pieprzyk, J [1 ]
Okamoto, E
机构
[1] Univ Wollongong, Sch IT & Comp Sci, Ctr Comp Secur Res, Wollongong, NSW 2522, Australia
[2] Univ Wisconsin, Ctr Cryptog Comp & Network Secur, Milwaukee, WI 53201 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper considers verifiable Shamir secret sharing and presents three schemes. The first scheme allows to validate secrets recovered. The second construction adds the cheater identification feature also called the share validation capability. The third scheme permits to share multiple secrets with secret validation. The constructions are based on hashing and for security evaluation, hashing is modelled as a random oracle with public description. We discuss an application of verifiable secret sharing for the design of cryptographic time capsules for time-release crypto.
引用
收藏
页码:169 / 183
页数:15
相关论文
共 50 条
  • [41] Verifiable Quantum Secret Sharing Based on a Single Qudit
    Dan-Li Zhi
    Zhi-Hui Li
    Zhao-Wei Han
    Li-Juan Liu
    International Journal of Theoretical Physics, 2020, 59 : 3672 - 3684
  • [42] A practical verifiable multi-secret sharing scheme
    Zhao, Jianjie
    Zhang, Jianzhong
    Zhao, Rong
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) : 138 - 141
  • [43] Verifiable secret redistribution protocol based on additive sharing
    Institute of Network Security, Shandong University, Jinan 250100, China
    不详
    Jisuanji Yanjiu yu Fazhan, 2006, 1 (23-27):
  • [44] Verifiable quantum (k, n)-threshold secret sharing
    Yu-Guang Yang
    Xin Jia
    Hong-Yang Wang
    Hua Zhang
    Quantum Information Processing, 2012, 11 : 1619 - 1625
  • [45] Verifiable threshold multi-secret sharing scheme
    Pang, Liao-Jun
    Li, Hui-Xian
    Li, Zhi-Jie
    Wang, Yu-Min
    Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2008, 40 (09): : 1462 - 1465
  • [46] An efficient threshold verifiable multi-secret sharing
    Dehkordi, Massoud Hadian
    Mashhadi, Samaneh
    COMPUTER STANDARDS & INTERFACES, 2008, 30 (03) : 187 - 190
  • [47] Sharing a verifiable secret image using two shadows
    Chang, Chin-Chen
    Lin, Chia-Chen
    Le, T. Hoang Ngan
    Le, Hoai Bac
    PATTERN RECOGNITION, 2009, 42 (11) : 3097 - 3114
  • [48] Verifiable Secret Sharing Scheme on Images using Watermarking
    Roy, Chitradeep Dutta
    Choudhury, Neel
    Chatterjee, Amrik
    Adhikari, Avishek
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (02): : 76 - 81
  • [49] Lightweight, Maliciously Secure Verifiable Function Secret Sharing
    de Castro, Leo
    Polychroniadou, Anitgoni
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT I, 2022, 13275 : 150 - 179
  • [50] Round-optimal and efficient verifiable secret sharing
    Fitzi, Matthias
    Garay, Juan
    Gollakota, Shyamnath
    Rangan, C. Pandu
    Srinathan, Karman
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 329 - 342