Verifiable Rational Secret Sharing Scheme in Mobile Networks

被引:8
|
作者
Zhang, En [1 ,2 ,3 ]
Yuan, Peiyan [1 ,3 ]
Du, Jiao [4 ]
机构
[1] Henan Normal Univ, Coll Comp & Informat Engn, Xinxiang 453007, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[3] Engn Lab Intelligence Business & Internet Things, Xinxiang 453007, Henan, Peoples R China
[4] Henan Normal Univ, Coll Math & Informat Sci, Xinxiang 453007, Peoples R China
基金
中国国家自然科学基金;
关键词
GAME-THEORY; CRYPTOGRAPHY;
D O I
10.1155/2015/462345
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of mobile network, lots of people now have access to mobile phones and the mobile networks give users ubiquitous connectivity. However, smart phones and tablets are poor in computational resources such as memory size, processor speed, and disk capacity. So far, all existing rational secret sharing schemes cannot be suitable for mobile networks. In this paper, we propose a verifiable rational secret sharing scheme in mobile networks. The scheme provides a noninteractively verifiable proof for the correctness of participants' share and handshake protocol is not necessary; there is no need for certificate generation, propagation, and storage in the scheme, which is more suitable for devices with limited size and processing power; in the scheme, every participant uses her encryption on number of each round as the secret share and the dealer does not have to distribute any secret share; every participant cannot gain more by deviating the protocol, so rational participant has an incentive to abide by the protocol; finally, every participant can obtain the secret fairly (means that either everyone receives the secret, or else no one does) in mobile networks. The scheme is coalition-resilient and the security of our scheme relies on a computational assumption.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] A non-interactive modular verifiable secret sharing scheme
    Li, Q
    Wang, ZF
    Niu, XM
    Sun, SH
    2005 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS, VOLS 1 AND 2, PROCEEDINGS: VOL 1: COMMUNICATION THEORY AND SYSTEMS, 2005, : 84 - 87
  • [32] A verifiable secret sharing scheme with combiner verification and cheater identification
    Kandar, Shyamalendu
    Dhara, Bibhas Chandra
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 51
  • [33] A Verifiable Secret Image Sharing Scheme Based on Compressive Sensing
    LI Xinyan
    XIAO Di
    MOU Huajian
    ZHANG Rui
    WuhanUniversityJournalofNaturalSciences, 2018, 23 (03) : 219 - 224
  • [34] A PAIRING-BASED PUBLICLY VERIFIABLE SECRET SHARING SCHEME
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2011, 24 (01) : 186 - 194
  • [35] A pairing-based publicly verifiable secret sharing scheme
    Tsu-Yang Wu
    Yuh-Min Tseng
    Journal of Systems Science and Complexity, 2011, 24 : 186 - 194
  • [36] A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem
    Kaya, Kamer
    Selcuk, Ali Aydin
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 414 - 425
  • [37] A Scheme of Rational Secret Sharing Against Cheating
    Cai Yong-quan
    Shi Hui-li
    INTERNATIONAL CONFERENCE OF CHINA COMMUNICATION (ICCC2010), 2010, : 60 - 64
  • [38] Bayesian mechanism for rational secret sharing scheme
    TIAN YouLiang
    PENG ChangGen
    LIN DongDai
    MA JianFeng
    JIANG Qi
    JI WenJiang
    Science China(Information Sciences), 2015, 58 (05) : 121 - 133
  • [39] A Verifiable Steganography-Based Secret Image Sharing Scheme in 5G Networks
    Qin, Shiyue
    Tan, Zhenhua
    Zhou, Fucai
    Xu, Jian
    Zhang, Zongye
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [40] Bayesian mechanism for rational secret sharing scheme
    Tian YouLiang
    Peng ChangGen
    Lin DongDai
    Ma JianFeng
    Jiang Qi
    Ji WenJiang
    SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (05) : 1 - 13