Computationally Secure Robust Multi-secret Sharing for General Access Structure

被引:1
|
作者
Das, Angsuman [1 ]
Roy, Partha Sarathi [2 ]
Adhikari, Avishek [2 ]
机构
[1] St Xaviers Coll, Dept Math, Kolkata, India
[2] Univ Calcutta, Dept Pure Math, Kolkata, India
来源
MATHEMATICS AND COMPUTING | 2015年 / 139卷
关键词
Robust secret sharing; General access structure; Computational security; SCHEME;
D O I
10.1007/978-81-322-2452-5_9
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Secret sharing scheme plays a crucial role in distributed cryptosystems. Due to its extensive use in numerous applications, an important goal in this area is to minimize trust among the participants. To remove this bottleneck, robust secret sharing, which allows the correct secret to be recovered even when some of the shares presented during an attempted reconstruction are incorrect, can be an efficient tool. However, as unconditional security demands honest majority and share size to be at least equal to the size of the secret, the need for computational security of such schemes has been felt over the years, specially in case of multi-secret sharing schemes. In this paper, we provide a notion of computationally robust multi-secret sharing scheme for general access structure. We also propose a robust multi-secret sharing scheme for general access structure and prove its computational security under the proposed notation.
引用
收藏
页码:123 / 134
页数:12
相关论文
共 50 条
  • [31] Verifiable multi-secret sharing schemes for multiple threshold access structures
    Tartary, Christophe
    Pieprzyk, Josef
    Wang, Huaxiong
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 167 - +
  • [32] Multi-secret Sharing Scheme for Level-Ordered Access Structures
    Tentu, Appala Naidu
    Basit, Abdul
    Bhavani, K.
    Venkaiah, V. Ch
    NUMBER-THEORETIC METHODS IN CRYPTOLOGY, 2018, 10737 : 267 - 278
  • [33] Visual Multi-Secret Sharing with Friendliness
    郑富国
    林恺翔
    林志鸿
    陈宗和
    JournalofShanghaiJiaotongUniversity(Science), 2014, 19 (04) : 455 - 465
  • [34] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138
  • [35] A threshold multi-secret sharing scheme
    Shi Runhua
    Huang Liusheng
    Luo yonglong
    Zhong Hong
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1705 - +
  • [36] Visual multi-secret sharing with friendliness
    Jeng F.-G.
    Lin K.-S.
    Lin C.-H.
    Chen T.-H.
    Journal of Shanghai Jiaotong University (Science), 2014, 19 (4) : 455 - 465
  • [37] Linear multi-secret sharing schemes
    Liangliang Xiao
    Mulan Liu
    Science in China Series F: Information Sciences, 2005, 48 : 125 - 136
  • [38] Linear multi-secret sharing schemes
    Xiao, LL
    Liu, ML
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2005, 48 (01): : 125 - 136
  • [39] A secure and efficient (t, n) threshold verifiable multi-secret sharing scheme
    Huang, MJ
    Zhang, JZ
    Xie, SC
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 532 - 537
  • [40] Linear multi-secret sharing schemes
    XIAO Liangliang & LIU Mulan Academy of Mathematics and System Sciences and Key Laboratory of Mathematics Mechanization
    Science in China(Series F:Information Sciences), 2005, (01) : 125 - 136