Computationally Secure Robust Multi-secret Sharing for General Access Structure

被引:1
|
作者
Das, Angsuman [1 ]
Roy, Partha Sarathi [2 ]
Adhikari, Avishek [2 ]
机构
[1] St Xaviers Coll, Dept Math, Kolkata, India
[2] Univ Calcutta, Dept Pure Math, Kolkata, India
来源
MATHEMATICS AND COMPUTING | 2015年 / 139卷
关键词
Robust secret sharing; General access structure; Computational security; SCHEME;
D O I
10.1007/978-81-322-2452-5_9
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Secret sharing scheme plays a crucial role in distributed cryptosystems. Due to its extensive use in numerous applications, an important goal in this area is to minimize trust among the participants. To remove this bottleneck, robust secret sharing, which allows the correct secret to be recovered even when some of the shares presented during an attempted reconstruction are incorrect, can be an efficient tool. However, as unconditional security demands honest majority and share size to be at least equal to the size of the secret, the need for computational security of such schemes has been felt over the years, specially in case of multi-secret sharing schemes. In this paper, we provide a notion of computationally robust multi-secret sharing scheme for general access structure. We also propose a robust multi-secret sharing scheme for general access structure and prove its computational security under the proposed notation.
引用
收藏
页码:123 / 134
页数:12
相关论文
共 50 条
  • [41] Secure Data Outsourcing in the Cloud Using Multi-secret Sharing Scheme (MSSS)
    Nag, Amitava
    Choudhary, Soni
    Dawn, Subham
    Basu, Suryadip
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND COMMUNICATION, 2017, 458 : 337 - 343
  • [42] A secure and efficient secret sharing scheme with general access structures
    Pang, Liao-Jun
    Li, Hui-Xian
    Wang, Yu-Min
    FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PROCEEDINGS, 2006, 4223 : 646 - 649
  • [43] Realizing secret sharing with general access structure
    Harn, Lein
    Hsu, Chingfang
    Zhang, Mingwu
    He, Tingting
    Zhang, Maoyuan
    INFORMATION SCIENCES, 2016, 367 : 209 - 220
  • [44] New multi-secret sharing scheme based on superincreasing sequence for level-ordered access structure
    Basit, Abdul
    Chanakya, Patibandla
    Venkaiah, V. Ch
    Moiz, Salman Abdul
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2020, 24 (04) : 357 - 380
  • [45] A verifiable multi-secret sharing scheme (VMSS)
    Pang Liaojun
    Li Huixian
    Jiao Licheng
    Wang Yumin
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 749 - +
  • [46] A New Verifiable Multi-secret Sharing Scheme Realizing Adversary Structure
    Dehkordi, Masoud Hadian
    Farzaneh, Yousof
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (03) : 1749 - 1758
  • [47] A Finite Equivalence of Verifiable Multi-secret Sharing
    Zhao, Hui
    Li, Mingchu
    Sakurai, Kouichi
    Ren, Yizhi
    Sun, Jonathan Z.
    Wang, Fengying
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2012, 5 (01) : 1 - 12
  • [48] A Finite Equivalence of Verifiable Multi-secret Sharing
    Hui Zhao
    Mingchu Li
    Kouichi Sakurai
    Yizhi Ren
    Jonathan Z. Sun
    Fengying Wang
    International Journal of Computational Intelligence Systems, 2012, 5 : 1 - 12
  • [49] Verifiable Rational Multi-secret Sharing Scheme
    Cai, Yongquan
    Luo, Zhanhai
    Yang, Yi
    INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 : 42 - 48
  • [50] A New Verifiable Multi-secret Sharing Scheme Realizing Adversary Structure
    Masoud Hadian Dehkordi
    Yousof Farzaneh
    Wireless Personal Communications, 2015, 82 : 1749 - 1758