Space-Efficient Verifiable Secret Sharing Using Polynomial Interpolation

被引:9
|
作者
Cafaro, Massimo [1 ]
Pelle, Piergiuseppe [1 ]
机构
[1] Univ Salento, Dept Engn Innovat, I-73100 Lecce, Italy
关键词
Security and privacy protection; cryptographic controls; verification;
D O I
10.1109/TCC.2015.2396072
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Preserving data confidentiality in clouds is a key issue. Secret Sharing, a cryptographic primitive for the distribution of a secret among a group of n participants designed so that only subsets of shareholders of cardinality 0 < t <= n are allowed to reconstruct the secret by pooling their shares, can helpmitigating andminimizing the problem. A desirable feature of Secret Sharing schemes is cheater detection, i.e., the ability to detect one ormoremalicious shareholders trying to reconstruct the secret by obtaining legal shares from the other shareholders while providing themwith fake shares. Verifiable Secret Sharing schemes solve this problemby allowing shareholders verifying the others' shares. We present new verification algorithms providing arbitrary secret sharing schemeswith cheater detection capabilities, and prove their space efficiency with regard to other schemes appeared in the literature. We also introduce, in one of our schemes, the Exponentiating Polynomial Root Problem (EPRP), which is believed to beNP-Intermediate and therefore difficult.
引用
收藏
页码:453 / 463
页数:11
相关论文
共 50 条
  • [21] Threshold changeable secret image sharing scheme based on interpolation polynomial
    Yan-Xiao Liu
    Ching-Nung Yang
    Chi-Ming Wu
    Qin-Dong Sun
    Wei Bi
    Multimedia Tools and Applications, 2019, 78 : 18653 - 18667
  • [22] Threshold changeable secret image sharing scheme based on interpolation polynomial
    Liu, Yan-Xiao
    Yang, Ching-Nung
    Wu, Chi-Ming
    Sun, Qin-Dong
    Bi, Wei
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (13) : 18653 - 18667
  • [23] Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation
    Yuan, Lifeng
    Li, Mingchu
    Guo, Cheng
    Choo, Kim-Kwang Raymond
    Ren, Yizhi
    PLOS ONE, 2016, 11 (10):
  • [24] New efficient and practical verifiable multi-secret sharing schemes
    Dehkordi, Massoud Hadian
    Mashhadi, Samaneh
    INFORMATION SCIENCES, 2008, 178 (09) : 2262 - 2274
  • [25] Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy
    Peng, Kun
    Bao, Feng
    INFORMATION SECURITY APPLICATIONS, 2009, 5932 : 118 - 132
  • [26] Efficient publicly verifiable secret sharing schemes with fast or delayed recovery
    Boudot, F
    Traoré, J
    INFORMATION AND COMMUNICATON SECURITY, PROCEEDINGS, 1999, 1726 : 87 - 102
  • [27] Novel basis matrix creation and preprocessing algorithms for friendly progressive visual secret sharing with space-efficient shares
    Shivendra Shivani
    Suneeta Agarwal
    Multimedia Tools and Applications, 2017, 76 : 8711 - 8744
  • [28] An Efficient Verifiable Secret Sharing Using Steganographic Technology Based on Convolutional Codes for Halftone Images
    Chang, Hsi-Yuan
    Chen, Chin-Hsing
    Wang, Jyun-Jie
    Lin, Chi-Yuan
    Tsai, Chun-Hsien
    2015 International Symposium on Bioelectronics and Bioinformatics (ISBB), 2015, : 115 - 119
  • [29] Novel basis matrix creation and preprocessing algorithms for friendly progressive visual secret sharing with space-efficient shares
    Shivani, Shivendra
    Agarwal, Suneeta
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (06) : 8711 - 8744
  • [30] Polynomial differential-based strong (n, t, n)-verifiable secret sharing
    Al Mahmoud, Qassim
    IET INFORMATION SECURITY, 2013, 7 (04) : 312 - 317