Verifiable Rational Secret Sharing Scheme in Mobile Networks

被引:8
|
作者
Zhang, En [1 ,2 ,3 ]
Yuan, Peiyan [1 ,3 ]
Du, Jiao [4 ]
机构
[1] Henan Normal Univ, Coll Comp & Informat Engn, Xinxiang 453007, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[3] Engn Lab Intelligence Business & Internet Things, Xinxiang 453007, Henan, Peoples R China
[4] Henan Normal Univ, Coll Math & Informat Sci, Xinxiang 453007, Peoples R China
基金
中国国家自然科学基金;
关键词
GAME-THEORY; CRYPTOGRAPHY;
D O I
10.1155/2015/462345
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of mobile network, lots of people now have access to mobile phones and the mobile networks give users ubiquitous connectivity. However, smart phones and tablets are poor in computational resources such as memory size, processor speed, and disk capacity. So far, all existing rational secret sharing schemes cannot be suitable for mobile networks. In this paper, we propose a verifiable rational secret sharing scheme in mobile networks. The scheme provides a noninteractively verifiable proof for the correctness of participants' share and handshake protocol is not necessary; there is no need for certificate generation, propagation, and storage in the scheme, which is more suitable for devices with limited size and processing power; in the scheme, every participant uses her encryption on number of each round as the secret share and the dealer does not have to distribute any secret share; every participant cannot gain more by deviating the protocol, so rational participant has an incentive to abide by the protocol; finally, every participant can obtain the secret fairly (means that either everyone receives the secret, or else no one does) in mobile networks. The scheme is coalition-resilient and the security of our scheme relies on a computational assumption.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] A Scheme of Rational Secret Sharing against Cheating
    Cai, Yongquan
    Shi, Huili
    PROCEEDINGS OF INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2009), 2009, : 166 - 169
  • [42] Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks
    Gan, Yuanju
    Wang, Lihua
    Wang, Licheng
    Pan, Ping
    Yang, Yixian
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [43] A Practical Publicly Verifiable Secret Sharing Scheme Based on Bilinear Pairing
    Tian, Youliang
    Peng, Changgen
    Zhang, Renping
    Chen, Yuling
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 71 - 75
  • [44] A novel approach for verifiable (n, n) audio secret sharing scheme
    Bharti, Shambhu Shankar
    Gupta, Manish
    Agarwal, Suneeta
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (19) : 25629 - 25657
  • [45] Publicly verifiable secret sharing
    Stadler, M
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 190 - 199
  • [46] A Novel Verifiable Dynamic Multi-Policy Secret Sharing Scheme
    Wang, Feng
    Gu, Lize
    Zheng, Shihui
    Yang, Yixian
    Hu, Zhengming
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 1474 - 1479
  • [47] A verifiable (k, n)-threshold dynamic quantum secret sharing scheme
    Li, Fulin
    Hu, Hang
    Zhu, Shixin
    Yan, Jiayun
    Ding, Jian
    QUANTUM INFORMATION PROCESSING, 2022, 21 (07)
  • [48] A new (k, n) verifiable secret image sharing scheme (VSISS)
    Nag, Amitava
    Biswas, Sushanta
    Sarkar, Debasree
    Sarkar, Partha Pratim
    EGYPTIAN INFORMATICS JOURNAL, 2014, 15 (03) : 201 - 209
  • [49] A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure
    Alam, Irfan
    Alali, Amal S.
    Ali, Shakir
    Asri, Muhammad S. M.
    AXIOMS, 2024, 13 (08)
  • [50] A Verifiable Multi-Secret Sharing Scheme with Elliptic Curve Cryptography
    Chattopadhyay, Arup Kumar
    Maitra, Paramita
    Nag, Amitava
    Saha, Himadri Nath
    2018 IEEE 9TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2018, : 1374 - 1379