Space-Efficient Verifiable Secret Sharing Using Polynomial Interpolation

被引:9
|
作者
Cafaro, Massimo [1 ]
Pelle, Piergiuseppe [1 ]
机构
[1] Univ Salento, Dept Engn Innovat, I-73100 Lecce, Italy
关键词
Security and privacy protection; cryptographic controls; verification;
D O I
10.1109/TCC.2015.2396072
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Preserving data confidentiality in clouds is a key issue. Secret Sharing, a cryptographic primitive for the distribution of a secret among a group of n participants designed so that only subsets of shareholders of cardinality 0 < t <= n are allowed to reconstruct the secret by pooling their shares, can helpmitigating andminimizing the problem. A desirable feature of Secret Sharing schemes is cheater detection, i.e., the ability to detect one ormoremalicious shareholders trying to reconstruct the secret by obtaining legal shares from the other shareholders while providing themwith fake shares. Verifiable Secret Sharing schemes solve this problemby allowing shareholders verifying the others' shares. We present new verification algorithms providing arbitrary secret sharing schemeswith cheater detection capabilities, and prove their space efficiency with regard to other schemes appeared in the literature. We also introduce, in one of our schemes, the Exponentiating Polynomial Root Problem (EPRP), which is believed to beNP-Intermediate and therefore difficult.
引用
收藏
页码:453 / 463
页数:11
相关论文
共 50 条
  • [31] Verifiable Secret Redistribution for Proactive Secret Sharing Schemes
    于佳
    孔凡玉
    李大兴
    JournalofShanghaiJiaotongUniversity(Science), 2006, (02) : 236 - 241
  • [32] Publicly verifiable function secret sharing
    Wang, Qiang
    Zhou, Fucai
    Peng, Su
    Xu, Jian
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2019, 20 (04) : 526 - 535
  • [33] Dynamic and Verifiable Hierarchical Secret Sharing
    Traverso, Giulia
    Demirel, Denise
    Buchmann, Johannes
    INFORMATION THEORETIC SECURITY, ICITS 2016, 2016, 10015 : 24 - 43
  • [34] Computational Verifiable Secret Sharing Revisited
    Backes, Michael
    Kate, Aniket
    Patra, Arpita
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 590 - 609
  • [35] Verifiable secret sharing and time capsules
    Pieprzyk, J
    Okamoto, E
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC'99, 2000, 1787 : 169 - 183
  • [36] DNA Algorithm of Verifiable Secret Sharing
    Liu Feng
    Gao Dong-Mei
    2009 ETP INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATION (FCC 2009), 2009, : 244 - 246
  • [37] Verifiable Image Secret Sharing in Matrix Projection Using Watermarking
    Patil, Sonali
    Deshmukh, Prashant
    2014 INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEMS, COMMUNICATION AND INFORMATION TECHNOLOGY APPLICATIONS (CSCITA), 2014, : 225 - 229
  • [38] A new approach of Secret Image Sharing using Verifiable Scheme
    Rao, Jyoti
    Venny, Priya
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1134 - 1139
  • [39] Publicly verifiable secret sharing schemes using bilinear pairings
    Tian, Youliang
    Peng, Changgen
    Ma, Jianfeng
    International Journal of Network Security, 2012, 14 (03) : 142 - 148
  • [40] Novel Verifiable General Secret Sharing Using Weil Pairing
    Zhao, Jianjie
    Gu, Dawu
    Wang, Yong
    WISM: 2009 INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, : 524 - +