Verifiable Rational Secret Sharing Scheme in Mobile Networks

被引:8
|
作者
Zhang, En [1 ,2 ,3 ]
Yuan, Peiyan [1 ,3 ]
Du, Jiao [4 ]
机构
[1] Henan Normal Univ, Coll Comp & Informat Engn, Xinxiang 453007, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[3] Engn Lab Intelligence Business & Internet Things, Xinxiang 453007, Henan, Peoples R China
[4] Henan Normal Univ, Coll Math & Informat Sci, Xinxiang 453007, Peoples R China
基金
中国国家自然科学基金;
关键词
GAME-THEORY; CRYPTOGRAPHY;
D O I
10.1155/2015/462345
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of mobile network, lots of people now have access to mobile phones and the mobile networks give users ubiquitous connectivity. However, smart phones and tablets are poor in computational resources such as memory size, processor speed, and disk capacity. So far, all existing rational secret sharing schemes cannot be suitable for mobile networks. In this paper, we propose a verifiable rational secret sharing scheme in mobile networks. The scheme provides a noninteractively verifiable proof for the correctness of participants' share and handshake protocol is not necessary; there is no need for certificate generation, propagation, and storage in the scheme, which is more suitable for devices with limited size and processing power; in the scheme, every participant uses her encryption on number of each round as the secret share and the dealer does not have to distribute any secret share; every participant cannot gain more by deviating the protocol, so rational participant has an incentive to abide by the protocol; finally, every participant can obtain the secret fairly (means that either everyone receives the secret, or else no one does) in mobile networks. The scheme is coalition-resilient and the security of our scheme relies on a computational assumption.
引用
收藏
页数:7
相关论文
共 50 条
  • [22] Verifiable Secret Sharing Authentication Scheme without Trusted Center for Mobile Ad Hoc Network
    Zhang, Zu-ping
    Song, Yang
    2ND INTERNATIONAL CONFERENCE ON MODELING, SIMULATION AND OPTIMIZATION TECHNOLOGIES AND APPLICATIONS (MSOTA 2018), 2018, : 439 - 443
  • [23] A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction
    Lin, Changlu
    Hu, Huidan
    Chang, Chin-Chen
    Tang, Shaohua
    IEEE ACCESS, 2018, 6 : 70666 - 70673
  • [24] Strong (n,t,n) verifiable secret sharing scheme
    Harn, Lein
    Lin, Changlu
    INFORMATION SCIENCES, 2010, 180 (16) : 3059 - 3064
  • [25] A novel verifiable weighted threshold quantum secret sharing scheme
    Dong, Yumin
    Luo, Yi
    Fu, Yanying
    PHYSICA SCRIPTA, 2023, 98 (06)
  • [26] VPSS: A verifiable proactive secret sharing scheme in distributed systems
    Pramanik, S
    Upadhyaya, S
    MILCOM 2003 - 2003 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2003, : 826 - 831
  • [27] A new approach of Secret Image Sharing using Verifiable Scheme
    Rao, Jyoti
    Venny, Priya
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1134 - 1139
  • [28] A novel non-interactive verifiable secret sharing scheme
    Ao, Jun
    Liao, Guisheng
    Ma, Chunbo
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 1525 - +
  • [29] Verifiable Quantum Secret Sharing Scheme Based on LDPC Codes
    Bai, Chen-Ming
    Feng, Yanan
    Zhang, Sujuan
    Liu, Lu
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2024, 63 (01)
  • [30] Verifiable Quantum Secret Sharing Scheme Based on LDPC Codes
    Chen-Ming Bai
    Yanan Feng
    Sujuan Zhang
    Lu Liu
    International Journal of Theoretical Physics, 63