Unconditionally non-interactive verifiable secret sharing secure against faulty majorities in the commodity based model

被引:0
|
作者
Nascimento, ACA
Mueller-Quade, J
Otsuka, A
Hanaoka, G
Imai, H
机构
[1] Univ Tokyo, Inst Ind Sci, Meguro Ku, Tokyo 1538505, Japan
[2] Univ Karlsruhe, Inst Algorithmen & Kognit Syst, D-76128 Karlsruhe, Germany
关键词
verifiable secret sharing; pre-distributed data; multiparty protocols;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a non-interactive verifiable secret sharing scheme (VSS) tolerating a dishonest majority based on data predistributed by a trusted authority. As an application of this VSS scheme we present very efficient unconditionally secure multiparty protocols based on predistributed data which generalize two-party computations based on linear predistributed bit commitments. The main results of this paper are a non-interactive VSS where the amount of data which needs to be predistributed to each player depends on the number of tolerable cheaters only, a simplified multiplication protocol for shared values based on predistributed random products, a protocol for fair exchange of secrets based on predistributed data, and non-interactive zero knowledge proofs for arbitrary polynomial relations.
引用
收藏
页码:355 / 368
页数:14
相关论文
共 50 条
  • [21] Quantum secret sharing based on Smolin bound entangled states isnot unconditionally secure
    Yu, Ya-fei
    Zhang, Zhi-ming
    QUANTUM OPTICS, OPTICAL DATA STORAGE, AND ADVANCED MICROLITHOGRAPHY, 2008, 6827
  • [22] Secure verifiable non-interactive oblivious transfer protocol using RSA and Bit commitment on distributed environment
    Kim, Soongohn
    Kim, Seoksoo
    Lee, Geuk
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE, 2009, 25 (03): : 352 - 357
  • [23] Provably secure non-interactive key distribution based on pairings
    Dupont, R
    Enge, A
    DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 270 - 276
  • [24] Non-Interactive Secure Computation Based on Cut-and-Choose
    Afshar, Arash
    Mohassel, Payman
    Pinkas, Benny
    Riva, Ben
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 387 - 404
  • [25] Hide the Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT
    Uzunkol, Osmanbey
    Rangasamy, Jothi
    Kuppusamy, Lakshmi
    INFORMATION SECURITY (ISC 2018), 2018, 11060 : 250 - 267
  • [26] Subset Sum-Based Verifiable Secret Sharing Scheme for Secure Multiparty Computation
    Olalia, Romulo L., Jr.
    Sison, Ariel M.
    Medina, Ruji P.
    RECENT ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGY 2018, 2019, 769 : 209 - 219
  • [27] Tightly Secure Non-Interactive Multisignatures in the Plain Public Key Model
    Qian, Haifeng
    Li, Xiangxue
    Huang, Xinli
    INFORMATICA, 2012, 23 (03) : 443 - 460
  • [28] Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks
    Karl, Ryan
    Burchfield, Timothy
    Takeshita, Jonathan
    Jung, Taeho
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT II, 2019, 305 : 425 - 439
  • [29] Sparse Matrix Masking-Based Non-Interactive Verifiable (Outsourced) Computation, Revisited
    Zhao, Liang
    Chen, Liqun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) : 1188 - 1206
  • [30] Non-Interactive and secure outsourcing of PCA-Based face recognition
    Ren, Yanli
    Xu, Xiao
    Feng, Guorui
    Zhang, Xinpeng
    Ren, Yanli (renyanli@shu.edu.cn), 1600, Elsevier Ltd (110):