Password-protected Secret-sharing Schemes without Random Oracles

被引:0
|
作者
Hasegawa, Shingo [1 ]
Isobe, Shuji [1 ]
Iwazaki, Jun-ya [1 ]
Koizumi, Eisuke [1 ]
Shizuya, Hiroki [1 ]
机构
[1] Tohoku Univ, Grad Sch Informat Sci, Sendai, Miyagi 9808576, Japan
关键词
password-protected secret sharing; standard model; simulation-sound non-interactive zero knowledge proof; subgroup decision problem; decision linear problem;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a password-protected secret sharing scheme which is provably secure without the random oracles. Three tools enable us to achieve this property: the IND-CCA secure threshold encryption scheme of Libert and Yung, the linear encryption scheme and the technique for constructing a simulation-sound non-interactive zero knowledge proof for any language in NP.
引用
收藏
页码:566 / 570
页数:5
相关论文
共 50 条
  • [1] Password-Protected Secret Sharing
    Bagherzandi, Ali
    Jarecki, Stanislaw
    Saxena, Nitesh
    Lu, Yanbin
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 433 - 443
  • [2] A Strengthened Security Notion for Password-Protected Secret Sharing Schemes
    Hasegawa, Shingo
    Isobe, Shuji
    Iwazaki, Jun-ya
    Koizumi, Eisuke
    Shizuya, Hiroki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (01) : 203 - 212
  • [3] Robust Password-Protected Secret Sharing
    Abdalla, Michel
    Cornejo, Mario
    Nitulescu, Anca
    Pointcheval, David
    COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 61 - 79
  • [4] Password-Protected Secret Sharing Scheme with the Same Threshold in Distribution and Restoration
    Tsujishita, Kentaro
    Iwamurra, Keiichi
    PROCEEDINGS OF THE 2018 FOURTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2018,
  • [5] A Password-Protected Secret Sharing based on Kurosawa-Desmedt Hybrid Encryption
    Arai, Takahiro
    Obana, Satoshi
    2016 FOURTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2016, : 597 - 603
  • [6] A Key Recovery System Based on Password-Protected Secret Sharing in a Permissioned Blockchain
    Ra, Gyeong-Jin
    Roh, Chang-Hyun
    Lee, Im-Yeong
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 65 (01): : 153 - 170
  • [7] Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model
    Jarecki, Stanislaw
    Kiayias, Aggelos
    Krawczyk, Hugo
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT II, 2014, 8874 : 233 - 253
  • [8] Evolving Ramp Secret-Sharing Schemes
    Beimel, Amos
    Othman, Hussien
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 313 - 332
  • [9] UNIVERSALLY IDEAL SECRET-SHARING SCHEMES
    BEIMEL, A
    CHOR, B
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1994, 40 (03) : 786 - 794
  • [10] Universally ideal secret-sharing schemes
    Beimel, Amos, 1600, IEEE, Piscataway, NJ, United States (40):